Can a malicious SSH server successfully *pretend* to know a client’s public key?

Yes, I know that after giving an SSH public key to someone else, one should always assume that it might have been swiftly published somewhere. (For instance, give your SSH public key to GitHub, and GitHub will publish it. E.g… Continue reading Can a malicious SSH server successfully *pretend* to know a client’s public key?

SSH to IP instead of to fully qualified hostname: does this reduce MITM risk?

I am applying configuration management to a VPS hosted by a VPS hosting company. Changing the hosting company is not an option, unfortunately.

This VPS has the following properties:

when newly-imaged or re-imaged, it gener… Continue reading SSH to IP instead of to fully qualified hostname: does this reduce MITM risk?

Permissions for configuration file for program run as root that must be modifiable by SFTP

A shell script (myscript) will be run as root, by cron. It reads IP addresses from a configuration file, and updates iptables to whitelist those IPs for inbound connections.

myscript uses a regexp (regular expression) to par… Continue reading Permissions for configuration file for program run as root that must be modifiable by SFTP

Padlocks suitable as teaching aids for public key cryptography – do they exist?

When explaining public key encryption, people commonly use the imagery of keys and padlocks. However, most padlocks have only one key (i.e. only one bitting), and work like this:

The padlock can be locked without any keys; … Continue reading Padlocks suitable as teaching aids for public key cryptography – do they exist?