Is it better to leave my SSH reverse tunnels exposed on a server, or expose them through tcp forwarding?

This is a follow up on When I use SSH tunneling, can I assume that the server does not need to be trusted?
When I am using an intermediate server I to connect to my endpoints via SSH tunnels, is it better if I don’t leave their ports open … Continue reading Is it better to leave my SSH reverse tunnels exposed on a server, or expose them through tcp forwarding?

What’s the point of users having to authorize their SSH keys and tokens they created themselves when SAML single sign-on is enabled on GitHub?

In GitHub’s Enterprise Cloud docs it says:

To use an SSH key with an organization that uses SAML single sign-on (SSO), you must first authorize the key.

I understand that organization admins could have the power to invalidate individual … Continue reading What’s the point of users having to authorize their SSH keys and tokens they created themselves when SAML single sign-on is enabled on GitHub?

OpenSSH 9.6p1: What is the best key type for the ssh-keygen command through the -t option?

The ssh-keygen command to generate the pair of keys files can use the -t option. According to Ubuntu Noble’s man ssh-keygen for the mentioned option, it indicates:
-t dsa | ecdsa | ecdsa-sk | ed25519 | ed25519-sk | rsa
Specifi… Continue reading OpenSSH 9.6p1: What is the best key type for the ssh-keygen command through the -t option?

New Open SSH Vulnerability

It’s a serious one:

The vulnerability, which is a signal handler race condition in OpenSSH’s server (sshd), allows unauthenticated remote code execution (RCE) as root on glibc-based Linux systems; that presents a significant security risk. This race condition affects sshd in its default configuration.

[…]

This vulnerability, if exploited, could lead to full system compromise where an attacker can execute arbitrary code with the highest privileges, resulting in a complete system takeover, installation of malware, data manipulation, and the creation of backdoors for persistent access. It could facilitate network propagation, allowing attackers to use a compromised system as a foothold to traverse and exploit other vulnerable systems within the organization…

Continue reading New Open SSH Vulnerability