mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

568
comptes actifs

#secureshell

0 message0 participant0 message aujourd’hui
Raven<p>OpenSSH 10.0 released with hybrid post-quantum algorithm mlkem768x25519-sha256 as default key agreement, new cipher preference list, new options, bug fixes</p><p><a href="https://www.openssh.com/releasenotes.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">openssh.com/releasenotes.html</span><span class="invisible"></span></a></p><p><a href="https://mastodon.bsd.cafe/tags/openssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openssh</span></a> <a href="https://mastodon.bsd.cafe/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.bsd.cafe/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.bsd.cafe/tags/secureshell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>secureshell</span></a> <a href="https://mastodon.bsd.cafe/tags/postquantumcryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>postquantumcryptography</span></a></p>
Agenda du Libre<p>Courbevoie: Atelier SSH (Secure SHell), Le samedi 15 mars 2025 de 09h30 à 17h30. <a href="https://www.agendadulibre.org/events/31956" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">agendadulibre.org/events/31956</span><span class="invisible"></span></a> <a href="https://pouet.chapril.org/tags/logicielLibre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>logicielLibre</span></a> <a href="https://pouet.chapril.org/tags/libre" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>libre</span></a> <a href="https://pouet.chapril.org/tags/starinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>starinux</span></a> <a href="https://pouet.chapril.org/tags/atelier" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>atelier</span></a> <a href="https://pouet.chapril.org/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://pouet.chapril.org/tags/secureShell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>secureShell</span></a></p>
ティージェーグレェI submitted a Pull Request to update MacPorts' OpenSSH to 9.9p2 here:<br><br><a href="https://github.com/macports/macports-ports/pull/27712" rel="nofollow noopener noreferrer" target="_blank">https://github.com/macports/macports-ports/pull/27712</a><br><br>GitHub Continuous Integration checks are running. Hopefully they will be OK (Update 2 out of 3 have completed successfully, which is a good sign).<br><br>I tested locally without issues, but I also build against LibreSSL locally, whereas GitHub CI and MacPorts' Build Bots I think default to OpenSSL.<br><br>This release is to address some vulnerabilities identified by Qualys and other less critical bugs.<br><br>More details from upstream here:<br><br><a href="https://www.openssh.com/releasenotes.html#9.9p2" rel="nofollow noopener noreferrer" target="_blank">https://www.openssh.com/releasenotes.html#9.9p2</a><br><br>Of particular note:<br><br>" Fix CVE-2025-26465 - ssh(1) in OpenSSH versions 6.8p1 to 9.9p1<br>(inclusive) contained a logic error that allowed an on-path<br>attacker (a.k.a MITM) to impersonate any server when the<br>VerifyHostKeyDNS option is enabled. This option is off by default.<br><br>* Fix CVE-2025-26466 - sshd(8) in OpenSSH versions 9.5p1 to 9.9p1<br>(inclusive) is vulnerable to a memory/CPU denial-of-service related<br>to the handling of SSH2<i>MSG</i>PING packets. This condition may be<br>mitigated using the existing PerSourcePenalties feature.<br><br>Both vulnerabilities were discovered and demonstrated to be exploitable<br>by the Qualys Security Advisory team. We thank them for their detailed<br>review of OpenSSH."<br><br>If I read everything correctly, these vulnerabilities primarily only impact the Portable OpenSSH releases (which is what MacPorts uses). However, OpenBSD has also issued the following errata to mitigate one of the issues as it also appears to impact OpenBSD users:<br><br>"008: SECURITY FIX: February 18, 2025 All architectures<br>sshd(8) denial of service relating to SSH2<i>MSG</i>PING handling. ssh(1) server impersonation when VerifyHostKeyDNS enabled.<br>A source code patch exists which remedies this problem."<br><br>Source code patch for OpenBSD here:<br><br><a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.6/common/008_ssh.patch.sig" rel="nofollow noopener noreferrer" target="_blank">https://ftp.openbsd.org/pub/OpenBSD/patches/7.6/common/008_ssh.patch.sig</a><br><br>Having written as much, it appears as if the main OpenSSH version for OpenBSD is still 9.9, so I am not going to make a submission for undeadly.org Other editors reading this are welcome to though, I just kind of have a lot of other stuff on my plate at present.<br><br>As usual, I also have too much going on in my life to want more responsibilities such as commit access within MacPorts, so it's up to someone else to merge it.<br><br><a href="https://snac.bsd.cafe?t=openssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#OpenSSH</a> <a href="https://snac.bsd.cafe?t=macports" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#MacPorts</a> <a href="https://snac.bsd.cafe?t=secureshell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#SecureShell</a> <a href="https://snac.bsd.cafe?t=infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#InfoSec</a> <a href="https://snac.bsd.cafe?t=cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Cryptography</a> <a href="https://snac.bsd.cafe?t=security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#Security</a> <a href="https://snac.bsd.cafe?t=cve" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#CVE</a> <a href="https://snac.bsd.cafe?t=patchtuesday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#PatchTuesday</a> <a href="https://snac.bsd.cafe?t=opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#OpenSource</a> <a href="https://snac.bsd.cafe?t=openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#OpenBSD</a><br>
Raven<p>OpenSSH 9.9 has been released with support for a new hybrid post-quantum key exchange, new sshd_config options, bug fixes</p><p><a href="https://www.openssh.com/releasenotes.html#9.9p1" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">openssh.com/releasenotes.html#</span><span class="invisible">9.9p1</span></a></p><p><a href="https://mastodon.bsd.cafe/tags/openssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openssh</span></a> <a href="https://mastodon.bsd.cafe/tags/secureshell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>secureshell</span></a> <a href="https://mastodon.bsd.cafe/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Peter N. M. Hansteen<p>OpenSSH 9.9 released! <a href="https://www.undeadly.org/cgi?action=article;sid=20240921181110" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">undeadly.org/cgi?action=articl</span><span class="invisible">e;sid=20240921181110</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/openssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openssh</span></a> <a href="https://mastodon.social/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://mastodon.social/tags/secureshell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>secureshell</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a></p>
Peter N. M. Hansteen<p>OpenSSH introduces options to penalize undesirable behavior <a href="https://www.undeadly.org/cgi?action=article;sid=20240607042157" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">undeadly.org/cgi?action=articl</span><span class="invisible">e;sid=20240607042157</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/openssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openssh</span></a> <a href="https://mastodon.social/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://mastodon.social/tags/persourcepenalties" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>persourcepenalties</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/adaptivepenalty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>adaptivepenalty</span></a> <a href="https://mastodon.social/tags/secureshell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>secureshell</span></a></p>
Peter N. M. Hansteen<p>sshd(8) split into multiple binaries <a href="https://www.undeadly.org/cgi?action=article;sid=20240517092416" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">undeadly.org/cgi?action=articl</span><span class="invisible">e;sid=20240517092416</span></a> <a href="https://mastodon.social/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenBSD</span></a> <a href="https://mastodon.social/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://mastodon.social/tags/sshd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshd</span></a> <a href="https://mastodon.social/tags/sshd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshd</span></a>-session <a href="https://mastodon.social/tags/privsep" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privsep</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/secureshell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>secureshell</span></a></p>
IT News<p>SSH backdoor has infected 400,000 Linux servers over 15 years and keeps on spreading - Enlarge (credit: BeeBright / Getty Images / iStockphoto) </p><p>Infra... - <a href="https://arstechnica.com/?p=2024591" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=2024591</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/uncategorized" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>uncategorized</span></a> <a href="https://schleuss.online/tags/secureshell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>secureshell</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/openssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openssh</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/ebury" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ebury</span></a> <a href="https://schleuss.online/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://schleuss.online/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a></p>
ティージェーグレェ<p>I submitted a PR to update MacPorts' OpenSSH to 9.6p1 here:</p><p><a href="https://github.com/macports/macports-ports/pull/21834" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/macports/macports-p</span><span class="invisible">orts/pull/21834</span></a></p><p>CI checks passed. It's up to someone else with commit access to merge it.</p><p><a href="https://rap.social/tags/OpenSSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSSH</span></a> <a href="https://rap.social/tags/MacPorts" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MacPorts</span></a> <a href="https://rap.social/tags/SecureShell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SecureShell</span></a> <a href="https://rap.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> <a href="https://rap.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://rap.social/tags/OpenSSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSSH</span></a></p>
ITSec News deutschSchwache Secure-Shell-Schlüssel erhöhen die Wahrscheinlichkeit einer Schlüsselduplikation. GitHub und Azure DevOps haben sie inzwischen widerrufen. <br><a href="https://www.heise.de/news/Sicherheitsluecke-Axosoft-warnt-Azure-DevOps-und-GitHub-vor-schwachen-SSH-Keys-6215308.html" rel="nofollow noopener noreferrer" target="_blank">Sicherheitslücke: Axosoft warnt Azure DevOps und GitHub vor schwachen SSH-Keys</a><br>