/os/ - Online Security

News, techniques and methods for computer network security.

Posting mode: Reply

Check to confirm you're not a robot
Name
Email
Subject
Comment
Password
Drawing x size canvas
File(s)

Board Rules

Max file size: 350.00 MB

Max files: 5

Max message length: 4096

Manage Board | Moderate Thread

Return | Magrathea | Catalog | Bottom


Welcome to Online Security the place for internet and computer security, privacy and anonymity.
If you have some helpful tips please feel free to share your ideas. Start a new thread, or contribute to an existing thread.

Expand All Images


SSH privacy Anonymous 05/11/2016 (Wed) 18:16:01 [Preview] No. 42
How can I anonymously ssh into something? Going through Tor and using a freshly generated key for identification is obvious, but how can I make sure that there is no data leakage above all that? I haven't been able to find any guides on that, even though it seems like something a lot of people might be interested in doing.


Anonymous 05/11/2016 (Wed) 20:06:21 [Preview] No. 43 del
>>42

eerr through multiple proxies? that's what i2p is for. There's no way that you could request ssh tunneling without being trace route by someone who urge to look over your real IP address. The question is, could he guess which one of you who made that ssh request.


Anonymous 05/11/2016 (Wed) 20:21:16 [Preview] No. 44 del
also, using dnsCrypt would help you hide your dns information from being known.


Anonymous 05/11/2016 (Wed) 21:01:41 [Preview] No. 45 del
>posting in the little retard's pet board
>captcha required

post this somewhere else if you are interested


Anonymous 10/21/2016 (Fri) 05:56:34 [Preview] No. 620 del
you gotta make suer your ssh deosn't show your key files to the server too


Anonymous 10/21/2016 (Fri) 12:05:39 [Preview] No. 621 del
>>620
Commenting out
SendEnv LANG LC_*
can help too.

Disabling pubkey auth is important. If you have passwordless key or have key loaded in ssh-agent, option
-oPubkeyAuthentication=no
disables pubkey auth completely.

Also, there's this thing to demonstrate deanon by ssh key:
https://github.com/FiloSottile/whosthere


Anonymous 12/28/2016 (Wed) 01:52:02 [Preview] No. 748 del
Finally, my almonds have been activated.


Anonymous 01/08/2017 (Sun) 19:31:59 [Preview] No. 782 del
In ~/.ssh/config so you don't leak your username if you forget to specify one.
host *

user root



Top | Catalog | Post a reply | Magrathea | Return