snac.daltux.net is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.

This server runs the snac software and there is no automatic sign-up process.

Site description
Daltux' personal ActivityPub microblog. Microblog pessoal de Daltux, parte da Teia Social global federada com o protocolo ActivityPub.
Admin account
@daltux@snac.daltux.net

Search results for tag #ssh

[?]Neil Brown [he/him/his] » 🌐
@neil@mastodon.neilzone.co.uk

New, dull, blogpost:

"Thoughts on increasing ssh security using a hardware security key"

No luck with a FOSS solution for Android yet :(

neilzone.co.uk/2026/04/thought

    AodeRelay boosted

    [?]Peter N. M. Hansteen » 🌐
    @pitrh@mastodon.social

    Neil Brown boosted

    [?]Neil Brown [he/him/his] » 🌐
    @neil@mastodon.neilzone.co.uk

    If you have got the following very specific thing to work, please let me know how!

    ssh, using ed25519-sk or ecdsa-sk, with a YubiKey with FIDO2, on Android (specifically GrapheneOS), with a Free software client

    My tinkering with termux has, so far, failed.

      [?]Thomas Cherryhomes » 🌐
      @tschak@oldbytes.space

      talking to my box over via the adapter, and the CaTer terminal program, which can connect to any supported network endpoint.

      (more info at fujinet.online/)

        🗳

        [?]Elton Carvalho » 🌐
        @eltonfc@bertha.social

        Here's a question that's been bugging me for a few weeks now:

        I'm a professor and there are PCs in the classrooms. Login in a controlled domain, users have no admin perms etc.

        Sometimes I from these machines to my box at my office to show some numerical stuff to the class.

        Which security practice is more reasonable? Keep a (passworded) key file in the windows machines and risk an (unlikely) extraction or login with a password and risk keylogging?

        Keep a key file in the windows machines:2
        Just type the password:6
        Why do you even have password login enabled?:5
        Keeping keys in public machines is a no-no:13

        Closed

          [?]jbz » 🌐
          @jbz@indieweb.social

          snakes.run: rendering 100M pixels a second over ssh · eieio.games

          eieio.games/blog/secure-massiv

            AodeRelay boosted

            [?]Graham Perrin » 🌐
            @grahamperrin@mastodon.bsd.cafe

            Exosphere:

            ― aggregated patch and security update reporting
            ― basic system status across multiple Unix-like hosts via SSH

            <exosphere.readthedocs.io/> | <github.com/mrdaemon/exosphere>

            <untrusted.website/@mr_daemon/1> @mr_daemon

            <mastodon.social/@terminaltrove> @terminaltrove

            A frame from the animated demo at the Welcome page.

            Alt...A frame from the animated demo at the Welcome page.

              [?]Tom Stoneham » 🌐
              @tomstoneham@dair-community.social

              Why do I find authentication keys so difficult to implement?

              The closest I have found to an idiot's guide didn't work and now I have messed with so many config files I will probably have to do a fresh install to have a chance.

              Does anyone know of a really simple walk-through *which is not a YouTube video* and not about GitHub? Ideally for a 5 but Debian will do.

              Please RT

                0 ★ 0 ↺

                [?]Daltux [ele/eles/he/them] » 🌐
                @daltux@snac.daltux.net

                Hoje eu aprendi que, com OpenSSH, basta um mero ssh -D 9999 -N destino — ou com autossh se quiser retomar automaticamente a conexão que cair — para poder usar a porta local (9999 no exemplo) como SOCKS proxy saindo pela máquina destino especificada! :mindBlown:

                Vivendo e aprendendo, temos que tirar o chapéu também para o pessoal do que presenteia o mundo ao desenvolver essa maravilha.


                Hackerman - meme do seriado Mr. Robot - Eliot Alderson (Rami Malek) posa com cara de esperto e braços cruzados, vestindo sua blusa de moletom com gorro, e mochila, em montagem que lembra o vídeo Kung Fury com um fundo 3D colorido e, em primeiro plano, a palavra Hackerman em letras brilhosas

                Alt...Hackerman - meme do seriado Mr. Robot - Eliot Alderson (Rami Malek) posa com cara de esperto e braços cruzados, vestindo sua blusa de moletom com gorro, e mochila, em montagem que lembra o vídeo Kung Fury com um fundo 3D colorido e, em primeiro plano, a palavra Hackerman em letras brilhosas

                  1 ★ 0 ↺

                  [?]Daltux [ele/eles/he/them] » 🌐
                  @daltux@snac.daltux.net

                  Teria bastante coisa a comentar com relação a :shell: , mas algo que acho que é pouco conhecido e que gosto bastante é do , aliado a algum multiplexador de terminal como screen, tmux ou byobu, para lidar melhor com conexões instáveis e/ou com latência incômoda etc.

                  Espero que continue a ser mantido... :travolta:

                  A alternativa que tenho usado em caso de segurança mais crítica é autossh, com o qual um multiplexador é ainda mais importante. Será que há outros projetos mais recentes semelhantes a mosh, talvez ainda com base em UDP? O que o pessoal recomenda nesse sentido? :blobHelp:

                  🔗 mosh.org

                  CC: @manualdousuario@mastodon.social


                    1 ★ 1 ↺

                    [?]Daltux [ele/eles/he/them] » 🌐
                    @daltux@snac.daltux.net

                    :securityHigh: Incoming news regarding OpenSSH in :debian: etc.:
                    apt-listchanges: News

                    openssh (1:10.1p1-1) UNRELEASED; urgency=medium

                    OpenSSH 10.1p1 includes a number of changes that may affect existing configurations:

                    - ssh(1): add a warning when the connection negotiates a non-post quantum key agreement algorithm.

                    This warning has been added due to the risk of "store now, decrypt later" attacks. More details at https://openssh.com/pq.html

                    This warning may be controlled via a new WarnWeakCrypto ssh_config option, defaulting to on. This option is likely to control additional weak crypto warnings in the future.