Explore >> Select a destination


You are here

www.agwa.name
| | blog.0xbadc0de.be
5.0 parsecs away

Travel
| | [AI summary] The provided text is a detailed article on best practices for securing SSH (Secure Shell) configurations and usage. It covers various aspects such as using SSH certificates, LDAP integration, avoiding passwordless private keys, and implementing multi-factor authentication (MFA). The text also includes discussions on smart cards, FIDO U2F, and tools for managing SSH keys. There are comments from readers discussing related topics like full disk encryption, key revocation, and tools like `whosthere` for capturing SSH public keys. The article is part of a blog post and includes links to external resources and other blog posts.
| | www.integralist.co.uk
5.0 parsecs away

Travel
| |
| | karla.io
4.6 parsecs away

Travel
| | [AI summary] The author details their journey of building a custom SSH client, exploring the protocol's layers, algorithm negotiation, key exchange, and authentication processes.
| | www.latacora.com
23.4 parsecs away

Travel
| When people talk about PBKDFs (Password Based Key Derivation Functions), this is usually either in the context of secure password storage, or in the context of how to derive cryptographic keys from potentially low-entropy passwords. The Password Hashing Competition (PHC, 2013-2015) was an open competition to derive new password hashing algorithms, resulting in Argon2 hash as its winner. Apart from achieving general hash security, many of the candidates focused on achieving resistance to parallel attacks ...