this post was submitted on 18 Feb 2025
89 points (95.9% liked)

Technology

63672 readers
4694 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Subtitle: Qualys finds two worrying bugs in OpenSSH

When I checked my personal rigs Debian had already released the patches and my home server had already auto updated itself.

top 4 comments
sorted by: hot top controversial new old
[–] [email protected] 9 points 1 week ago

Soo, the point is to not enable features that undermine security, like using an FQDN as a key (or source of a key) and to enable features that reduce DoS, like a connection timeout. Does not sound like bugs, just like missing default options.

It's still important to not use the affecting options.

[–] [email protected] 6 points 1 week ago

Hot take: Might be wise to adopt the security by obscurity model and go with an OS that is hardened (ideally, a formally verified microkernel like sel4) or runs in a custom VM/container with almost zero attack surface area.

[–] pHr34kY 4 points 1 week ago (1 children)

The single biggest attack vector for SSH is IPv4. Disable it and 99% of issues go away.

[–] [email protected] 8 points 1 week ago

If my isp would support ipv6, that would be great!