I have two servers. Both servers are in CentOS 5.6. I want to SSH from Server 1 to Server 2 using a private key I have (OpenSSH SSH-2 Private Key).
Since I want to protect my ssh connections, I set some global cipher suite options to restrict set of used algorithms. But recently I’ve encountered a server which doesn’t support some of those algorithms. So, I need to selectively enable deprecated algorithms for a specific host record in client (my system) configuration.
I have Linux mint on my pc.
I read about setting up ssh keys in Linux and have some questions. Correct me if I’m wrong…
By default, recent versions of OpenSSH automatically set ForwardX11Timeout
to 20 minutes if you set ForwardX11Trusted
to no.
I am in a situation where several users are sharing the same user account on a remote machine. I have a “personal” directory where I wrote my own .zshrc
file, and I would like to have a way to:
I’ve found that ssh-keygen
(“ssh” package) produces different keys from puttygen
(“putty” package).
I am using @GarethTheRed ‘s answer to this question to install fail2ban on a remote CentOS 7 server. I am able to complete all the steps up until tail -f /var/log/fail2ban.log
, at which point I get different results than he gets in his answer.