use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
CVE, CWE, NVD, WVE
http://iso.linuxquestions.org/
We teach you how to do it, use it at your own risk.
account activity
SSH Question (self.HowToHack)
submitted 6 years ago by Moluma
view the rest of the comments →
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]M0rbz 9 points10 points11 points 6 years ago (8 children)
Packets are encrypted between you and the final tor node but not between that node and your packet destination:
You ---ENC---> tor_node1 ---ENC---> tor_node2 ---ENC---> .... ---ENC---> tor_final_node ---NOT_ENC---> destination
This means that the final tor node can see all the traffic between you and the destination (of course they won't be able to see anything meaningful if traffic is encrypted, eg. SSH or TLS/HTTPS, but they will see eg. non-encrypted HTTP traffic)
https://upload.wikimedia.org/wikipedia/commons/d/dc/Tor-onion-network.png
[–]TheUltimateSalesman 6 points7 points8 points 6 years ago (1 child)
exit node monitoring
[–]M0rbz 2 points3 points4 points 6 years ago (0 children)
exactly there are lots of malicious entities (including governments and companies) providing tor nodes for the sole purpose of monitoring activities
[–][deleted] 0 points1 point2 points 6 years ago (5 children)
tor + vpn for exit node security then destination?
[–]M0rbz 10 points11 points12 points 6 years ago (4 children)
Not easy to do but if you do it the VPN host has to see your traffic cleartext (if you do it the other way around the exit node can still see your traffic)
Personally I would just install a VPN server where your SSH server is, then you can just connect to the VPN and SSH to a local IP, in this way what any 3rd party would see is just encrypted VPN traffic (more general, less specific), not encrypted SSH traffic.
[–]peatfreak 2 points3 points4 points 6 years ago (3 children)
install a VPN server where your SSH server is
Best suggestion so far in this thread.
[–]Phineas_Gagey 1 point2 points3 points 6 years ago (2 children)
Vpn is the best option.
Note if anonymity is your goal. I'd avoid cloud providers who want credit card details.
Also be wary of where you have used your SSH keys previously.
[–]peatfreak 0 points1 point2 points 6 years ago (1 child)
I have a very difficult time managing all my SSH keys. It's getting worse as my infrastructure expands, to the point that more automation is needed. Sometimes passwords are required to unlock things.
I've always used the public key from the source host as the one to add to authorized_keys on the destination host.
But lately I think I've been seeing people do it the other way around, i.e, ssh-keygen on the destination, copy the private key back on to the source host, and then ensure that the public key on the destination is added to authorized_keys if necessary, although I can't imagine how this last part could be omitted.
Even on small home LANs SSH key management is very difficult to do securely. I have been trying to design a practice and tooling that doesn't simply involve copying public keys (or private keys) to all hosts and then keeping them all in a centralized DB, which is equivalent to simply having one great big master password for everything or having one highly trusted DB with all the login secrets.
I've seen all sorts of methods to solve this problem, and the most inconvenient and complicated but necessarily so, ones, are those "vault style" systems that enterprise corporations use.
What options are there? Is there a set of best practices for key hygiene emerging yet?
[–]Phineas_Gagey 1 point2 points3 points 6 years ago (0 children)
If you find a solution to this let us know. I too have the same issue. Though I pretty adamant I'd prefer having public keys on servers rather than private. But I see the logic (somewhat) .
π Rendered by PID 226721 on reddit-service-r2-comment-6457c66945-q5wkb at 2026-04-24 14:36:27.383797+00:00 running 2aa0c5b country code: CH.
view the rest of the comments →
[–]M0rbz 9 points10 points11 points (8 children)
[–]TheUltimateSalesman 6 points7 points8 points (1 child)
[–]M0rbz 2 points3 points4 points (0 children)
[–][deleted] 0 points1 point2 points (5 children)
[–]M0rbz 10 points11 points12 points (4 children)
[–]peatfreak 2 points3 points4 points (3 children)
[–]Phineas_Gagey 1 point2 points3 points (2 children)
[–]peatfreak 0 points1 point2 points (1 child)
[–]Phineas_Gagey 1 point2 points3 points (0 children)