Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse

NodeBB

  1. Home
  2. Selfhosted
  3. Doesn't take that to leverage an unknown vulnerability in ssh like:

Doesn't take that to leverage an unknown vulnerability in ssh like:

Scheduled Pinned Locked Moved Selfhosted
10 Posts 2 Posters 11 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • P This user is from outside of this forum
    P This user is from outside of this forum
    [email protected]
    wrote last edited by
    #1

    Doesn't take that to leverage an unknown vulnerability in ssh like:

    https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server

    That's why it's common best practice to never expose ssh to raw internet if you can help it; but yes it's not the most risky thing ever either.

    T 1 Reply Last reply
    27
    • P [email protected]

      Doesn't take that to leverage an unknown vulnerability in ssh like:

      https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server

      That's why it's common best practice to never expose ssh to raw internet if you can help it; but yes it's not the most risky thing ever either.

      T This user is from outside of this forum
      T This user is from outside of this forum
      [email protected]
      wrote last edited by
      #2

      I remember that one. Those are pretty rare and usually involve a specific configuration that is often not the default, though, right? When such a vulnerability is found, is it rightly so major news.

      P 1 Reply Last reply
      0
      • T [email protected]

        I remember that one. Those are pretty rare and usually involve a specific configuration that is often not the default, though, right? When such a vulnerability is found, is it rightly so major news.

        P This user is from outside of this forum
        P This user is from outside of this forum
        [email protected]
        wrote last edited by
        #3

        "This race condition affects sshd in its default configuration." direct quote from the linked article, paragraph like... 3. I linked it so people could read, not speculate.

        T 1 Reply Last reply
        1
        • P [email protected]

          "This race condition affects sshd in its default configuration." direct quote from the linked article, paragraph like... 3. I linked it so people could read, not speculate.

          T This user is from outside of this forum
          T This user is from outside of this forum
          [email protected]
          wrote last edited by [email protected]
          #4

          Ah, now I remember. It took a quick configuration change to mitigate this. Still, I’d call this very rare.

          I’m going side with @[email protected] on this one.

          P 1 Reply Last reply
          0
          • T [email protected]

            Ah, now I remember. It took a quick configuration change to mitigate this. Still, I’d call this very rare.

            I’m going side with @[email protected] on this one.

            P This user is from outside of this forum
            P This user is from outside of this forum
            [email protected]
            wrote last edited by
            #5

            Agreed, but best practices are meant to deal with the very rare. They didn't put the vulnerabilities in the software due to negligence or malice, it's just an ever evolving arms race with cracks that show up due to layer upon layer of abstraction. Again I'm not saying to never expose ssh to the net, quite the opposite, but as a best practice you should never do it unless you fully understand the risk and are prepared to deal with any potential consequences. That's just a core tenant of understanding security posture.

            T 1 Reply Last reply
            1
            • P [email protected]

              Agreed, but best practices are meant to deal with the very rare. They didn't put the vulnerabilities in the software due to negligence or malice, it's just an ever evolving arms race with cracks that show up due to layer upon layer of abstraction. Again I'm not saying to never expose ssh to the net, quite the opposite, but as a best practice you should never do it unless you fully understand the risk and are prepared to deal with any potential consequences. That's just a core tenant of understanding security posture.

              T This user is from outside of this forum
              T This user is from outside of this forum
              [email protected]
              wrote last edited by [email protected]
              #6

              Sure, don’t open ports you don’t need. I said in a different here that I reject all expect IP ranges I’m in for home, mobile and work. That works for me. That blocks the vast majority of the world.

              I agree with the other guy that I’m not a target for these vulnerabilities. They are rare and hard to exploit, and valuable. But the basic advice you give is good, obviously.

              Don’t expose what you don’t need to expose. Still I have Immich and all of my photos on there. Good luck scamming me with threats of sending them to my family and work. 😀

              P 1 Reply Last reply
              1
              • T [email protected]

                Sure, don’t open ports you don’t need. I said in a different here that I reject all expect IP ranges I’m in for home, mobile and work. That works for me. That blocks the vast majority of the world.

                I agree with the other guy that I’m not a target for these vulnerabilities. They are rare and hard to exploit, and valuable. But the basic advice you give is good, obviously.

                Don’t expose what you don’t need to expose. Still I have Immich and all of my photos on there. Good luck scamming me with threats of sending them to my family and work. 😀

                P This user is from outside of this forum
                P This user is from outside of this forum
                [email protected]
                wrote last edited by [email protected]
                #7

                I've always disliked IT discussions for reasons like this. Everyone who comments seems to think that the mitigations, security considerations, and security compromises (IE, not caring if your images are leaked online) they've made are common knowledge... But, this is a forum advising people on how to configure their home severs for hobbiest use. Best practices should be the mantra, "just raw dog ssh on the internet with your 443/80 port mapping and you're g2g" [sic] shouldn't be an acceptable answer to you. If they'd stated that there are security considerations, but they like to implement them and expose ssh to the net for management purposes I'd have nothing to say, but to just advise people who lack that extra experience, without helping them understand why you're okay doing what you're doing and what you've done to solve for specific issues that the default configuration does not seems unhelpful at best.

                T 1 Reply Last reply
                1
                • P [email protected]

                  I've always disliked IT discussions for reasons like this. Everyone who comments seems to think that the mitigations, security considerations, and security compromises (IE, not caring if your images are leaked online) they've made are common knowledge... But, this is a forum advising people on how to configure their home severs for hobbiest use. Best practices should be the mantra, "just raw dog ssh on the internet with your 443/80 port mapping and you're g2g" [sic] shouldn't be an acceptable answer to you. If they'd stated that there are security considerations, but they like to implement them and expose ssh to the net for management purposes I'd have nothing to say, but to just advise people who lack that extra experience, without helping them understand why you're okay doing what you're doing and what you've done to solve for specific issues that the default configuration does not seems unhelpful at best.

                  T This user is from outside of this forum
                  T This user is from outside of this forum
                  [email protected]
                  wrote last edited by
                  #8

                  Listen.

                  Don’t expose any port to any service if you don’t need it.

                  If you do, make sure it’s as secure as you can reasonably make it.

                  I’m not disagreeing.

                  P 1 Reply Last reply
                  0
                  • T [email protected]

                    Listen.

                    Don’t expose any port to any service if you don’t need it.

                    If you do, make sure it’s as secure as you can reasonably make it.

                    I’m not disagreeing.

                    P This user is from outside of this forum
                    P This user is from outside of this forum
                    [email protected]
                    wrote last edited by
                    #9

                    My bad. I misread your previous post, specifically around "I agree with the other guy". That being said, anyone with a functional device that can compute any amount of monero hashes is a proven target, granted, not specifically.

                    T 1 Reply Last reply
                    1
                    • P [email protected]

                      My bad. I misread your previous post, specifically around "I agree with the other guy". That being said, anyone with a functional device that can compute any amount of monero hashes is a proven target, granted, not specifically.

                      T This user is from outside of this forum
                      T This user is from outside of this forum
                      [email protected]
                      wrote last edited by
                      #10

                      It’s good to be paranoid when it comes to IT security (and software development). 👍

                      1 Reply Last reply
                      1
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      • Login

                      • Login or register to search.
                      Powered by NodeBB Contributors
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • World
                      • Users
                      • Groups