SSHamble: Open-source security testing of SSH services

runZero published new research on Secure Shell (SSH) exposures and unveiled a corresponding open-source tool, SSHamble. This tool helps security teams validate SSH implementations by testing for uncommon but dangerous misconfigurations and software bug… Continue reading SSHamble: Open-source security testing of SSH services

Is it better to leave my SSH reverse tunnels exposed on a server, or expose them through tcp forwarding?

This is a follow up on When I use SSH tunneling, can I assume that the server does not need to be trusted?
When I am using an intermediate server I to connect to my endpoints via SSH tunnels, is it better if I don’t leave their ports open … Continue reading Is it better to leave my SSH reverse tunnels exposed on a server, or expose them through tcp forwarding?

What’s the point of users having to authorize their SSH keys and tokens they created themselves when SAML single sign-on is enabled on GitHub?

In GitHub’s Enterprise Cloud docs it says:

To use an SSH key with an organization that uses SAML single sign-on (SSO), you must first authorize the key.

I understand that organization admins could have the power to invalidate individual … Continue reading What’s the point of users having to authorize their SSH keys and tokens they created themselves when SAML single sign-on is enabled on GitHub?