In some special cases is a VM accessible over NAT and on different port as usually 22.
In this case – SSH is running on port 222.
This make the rsync operation little bit complexer:
1 | rsync -vraze 'ssh -p 222' root@remote:/source/ /destination/ |
In some special cases is a VM accessible over NAT and on different port as usually 22.
In this case – SSH is running on port 222.
This make the rsync operation little bit complexer:
1 | rsync -vraze 'ssh -p 222' root@remote:/source/ /destination/ |
rsync -vraze 'ssh -p 222' root@remote:/source/ /destination/
Inetd listens for connections on certain sockets. When a connection is found on one of its sockets, it decides what service the socket corresponds to, and invokes a program to service the request. The server program is invoked with the service socket as its standard input, output and error descriptors.
Essentially, inetd allows running one daemon to invoke several others [Read more…]
Dropbear is a relatively small open source SSH 2 server. It runs on a variety of POSIX-based platforms.
The perfect environment for this server could be a little low-end system like your mobile phone or BeagleBone.
Installation:
1 | apt-get install dropbear |
apt-get install dropbear
Configuration
vim /etc/default/dropbear
1 2 3 4 | NO_START=0 DROPBEAR_PORT=22 # Alternative dropbear login banner DROPBEAR_BANNER="/opt/dropbear-banner" |
NO_START=0 DROPBEAR_PORT=22 # Alternative dropbear login banner DROPBEAR_BANNER="/opt/dropbear-banner"
Another modern method for the mobile age to be up to date everywhere about your infrastructure. Everyone has a mobile device with internet access, you need only a ICQ client to receive information notifications.
Today I’m going to talk about how to bring this idea to live… [Read more…]
SSH is by default very strong, and since a long time without critical bugs. It has strong protection against various hacks and known vulnerabilities. For instance SSH has a password retry wait time of (default) five seconds. This makes the time for brute force attacking an SSH-server very long and not effective. However, sometimes script-kiddies will fork their hacking program making multiple processes of the brute force attack. Sometimes they are able to fork it off upwards of 1000 attempts every 5 seconds. This drastically minimizes the time to crack short passwords.
I think SSH is secure enough, but there is always a way to make it more secure.
Install knock daemon:
1 | aptitude install knockd |
aptitude install knockd