Jump in the discussion.

No email address required.

Do you use ssh keys?

!codecels

I feel like it's surprising that some people don't in 2024 but clearly ssh keys present their own challenges that people are less familiar with vs. passwords.

I quite like 1Passwords ability to act as the ssh agent https://developer.1password.com/docs/ssh/manage-keys/


Follower of Christ :marseyandjesus: Tech lover, IT Admin, heckin pupper lover and occasionally troll. I hold back feelings or opinions, right or wrong because I dislike conflict.

Jump in the discussion.

No email address required.

It always seemed strange to me too that people use stuff like fail2ban and etc. Just change your ssh port to stop the log spam and use ssh keys and then forget about it.

Jump in the discussion.

No email address required.

It's ritualistic.

Jump in the discussion.

No email address required.

I don't even have them public anymore. TailScale is too nice.


Follower of Christ :marseyandjesus: Tech lover, IT Admin, heckin pupper lover and occasionally troll. I hold back feelings or opinions, right or wrong because I dislike conflict.

Jump in the discussion.

No email address required.

I do but I've never once passphrase protected one - do you?

Jump in the discussion.

No email address required.

Yeah, it's pretty easy for malware to slurp up your home folder and you're boned.

Using an ssh agent will keep you from having it unencrypted on disk but also not having to enter your passphrase every time.


Follower of Christ :marseyandjesus: Tech lover, IT Admin, heckin pupper lover and occasionally troll. I hold back feelings or opinions, right or wrong because I dislike conflict.

Jump in the discussion.

No email address required.

The frick is an sssss key? Is it a library key card telling me to be quiet?

Jump in the discussion.

No email address required.

Are you a threat actor? :marseykyle:

Jump in the discussion.

No email address required.

Yes

A threat to your sweet and supple bussy

Jump in the discussion.

No email address required.

..... proof?

Jump in the discussion.

No email address required.

yea


Follower of Christ :marseyandjesus: Tech lover, IT Admin, heckin pupper lover and occasionally troll. I hold back feelings or opinions, right or wrong because I dislike conflict.

Jump in the discussion.

No email address required.

They can be confusing but they are a huge boon

Jump in the discussion.

No email address required.

okay, kid im done. i doubt you even have basic knowlege of hacking. i doul boot linux so i can run my scripts. you made a big mistake of replying to my comment without using a proxy, because i'm already tracking youre ip. since ur so hacking iliterate, that means internet protocol. once i find your ip i can easily install a backdoor trojan into your pc, not to mention your email will be in my hands. dont even bother turning off your pc, because i can rout malware into your power system so i can turn your excuse of a computer on at any time. it might be a good time to cancel your credit card since ill have that too. if i wanted i could release your home information onto my secure irc chat and maybe if your unlucky someone will come knocking at your door. id highly suggest you take your little comment about me back since i am no script kiddie. i know java and c++ fluently and make my own scripts and source code.

Snapshots:

https://media.giphy.com/media/jCodV34MoczjW/giphy.webp:

Jump in the discussion.

No email address required.

So @J cant store a private key on @J's machine? How do you deal with this?

this post rests on native land

Jump in the discussion.

No email address required.

Link copied to clipboard
Action successful!
Error, please refresh the page and try again.