Home Tags SSH

Tag: SSH

Cisco patches switch hijacking hole – the one exploited by the...

Telnet security flaw fix finally lands – or just use SSH, yeah? Cisco has patched a critical security flaw in its switches that can be potentially exploited by miscreants to hijack networks – a flaw disclosed in the Vault 7 leak of CIA files.…

VU#491375: Intel Active Management Technology (AMT) does not properly enforce access...

Technologies based on Intel Active Management Technology may be vulnerable to remote privilege escalation,which may allow a remote,unauthenticated attacker to execute arbitrary code on the system.

Hackers uncork experimental Linux-targeting malware

SSH... it's Shishiga Hackers have unleashed a new malware strain that targets Linux-based systems.…

New Linux SSH server shows off Golang’s infrastructure power

Gravitational, maker of a software-as-a-service support system built with Kubernetes, has released the latest open source iteration of a key part of that system.Teleport, an SSH server that provides support teams with a simpler way to remotely manag...

Stop us if you’ve heard this: Cisco Aironet has hard-coded passwords

Get patching, friends Cisco's discovered that its Mobility Express Software, shipped with Aironet 1830 Series and 1850 Series access points, has a hard-coded admin-level SSH password.…

Pushing apps to the edge, Fly.io puts middleware in the cloud

New service puts logic closer to users, aims to be "global load balancer" for apps.

Discover the power of Bash on Windows

Microsoft Windows may be the dominant player on the desktop, but the rapidly increasing open source software market—especially for admin and dev tools—clearly favors Linux. Not to mention the mobile market, where Android uses Linux variants. If you’re a developer on Windows, the drumbeat to get hip to Linux capabilities keeps getting louder. Over the years, Microsoft has introduced various workarounds for using Linux capabilities on Windows, such as PowerShell with SSH and Cygwin and MSYS. Running Linux inside a virtual machine is another option. But VMs consume a significant amount of resources and don’t provide a first-class Linux experience, as you can’t edit local files or get full access to local drives, for example.To read this article in full or to leave a comment, please click here

Google App Engine adds C#, Node.js, and Ruby options

Google is enhancing developer options on two fronts, adding language options to its App Engine PaaS cloud and moving its event-driven computing platform, Cloud Functions, to public beta. It announced the moves at the Google Cloud Next conference in San Francisco.App Engine will now provide development environments for C#, Node.js, and Ruby, having already supported Go, Java 8, PHP 5-7, and Python 2 and 3 in a similar out-of-the-box manner. Node.js support had been on App Engine in a beta stage previously.[ Get started: A developer’s guide to serverless computing. | Keep up with hot topics in programming with InfoWorld's App Dev Report newsletter. ]Google will give developers the option of using other languages on App Engine, provided they are willing to bring their own runtimes for them. App Engine also supports packaging applications as Docker containers, which could be run inside the Google cloud or elsewhere, and is getting better support for high-control scenarios, providing SSH (Secure Shell) access. A developer, for example, may want to do advanced debugging or gain more insight into their application.To read this article in full or to leave a comment, please click here

Hacker George Hotz cancels Model S order after Tesla reminds him...

Was set to receive a car last week, then came a last-minute call from Tesla legal.

Uber Debuts SSH Key Authentication Module

Developers at Uber have unveiled a new module to help users enable the continuous re-authentication of SSH keys.

RHSA-2017:0195-1: Important: ansible security update

An update for ansible is now available for Red Hat OpenStack Platform 10.0(Newton).Red Hat Product Security has rated this update as having a security impact ofImportant.

A Common Vulnerability Scoring System (CVSS) base score, which givesa detailed s...

RHBA-2017:0068-1: lftp bug fix update

Updated lftp packages that fix one bug are now available for Red Hat EnterpriseLinux 7. LFTP is a file transfer utility for File Transfer Protocol (FTP), Secure FileTransfer Protocol (SFTP), Hypertext Transfer Protocol (HTTP), and other commonlyused protocols. It uses the readline library for input, and provides support forbookmarks, built-in monitoring, job control, and parallel transfer of multiplefiles at the same time.This update fixes the following bug:* Previously, when mirroring files with the lftp utility over SFTP, lftpsometimes received EOF from SSH before it was able to flush the rest of the databuffer. As a consequence, the last data packet was lost. This update adds acondition to ensure that if there is some data left in the buffer in thedescribed situation, the data is safely passed to the internal buffer. As aresult, data packets are no longer lost in the described scenario. (BZ#1392944)Users of lftp are advised to upgrade to these updated packages, which fix thisbug. Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 7) SRPMS: lftp-4.4.8-8.el7_3.2.src.rpm     MD5: 32b2fdf953c0e1a6463185b24b87953eSHA-256: f83a8f962c00fe8b4b357d15553fec8b8570b458cad649ea85dfd5106bbc3770   x86_64: lftp-4.4.8-8.el7_3.2.i686.rpm     MD5: 7dac04214f0cc5fb942ee79ae9cdba7cSHA-256: cf34037dc04a8758b906fda491361501c6d53bcdc842d45512faac889cf2ac44 lftp-4.4.8-8.el7_3.2.x86_64.rpm     MD5: 0b652348f2bd3dfe1eab2ecc91993d94SHA-256: e4b37111e3fc9a74878efee3851a008767221f58881eefbddb49efa45f344735 lftp-debuginfo-4.4.8-8.el7_3.2.i686.rpm     MD5: ac4d066f1dcb96b1f86fdff80cddb75bSHA-256: cbb1b24d8634e201948ff37f9151c24d477aaa6aa75dfa27fc693adeac21c34f lftp-debuginfo-4.4.8-8.el7_3.2.x86_64.rpm     MD5: 03dbbaec1cff1109a04e672e9fd8784aSHA-256: 0319bbabf90cd63013f34a1e53e3e2a12377816c76d3597f761c6a2fce8093f5 lftp-scripts-4.4.8-8.el7_3.2.noarch.rpm     MD5: e79789c6edb6071e36fc6122e2f0b822SHA-256: fdfc4aa21162f78b957faaea845db97a29e5bb6e13bc4560d1c267789ff7eabf   Red Hat Enterprise Linux HPC Node (v. 7) SRPMS: lftp-4.4.8-8.el7_3.2.src.rpm     MD5: 32b2fdf953c0e1a6463185b24b87953eSHA-256: f83a8f962c00fe8b4b357d15553fec8b8570b458cad649ea85dfd5106bbc3770   x86_64: lftp-4.4.8-8.el7_3.2.i686.rpm     MD5: 7dac04214f0cc5fb942ee79ae9cdba7cSHA-256: cf34037dc04a8758b906fda491361501c6d53bcdc842d45512faac889cf2ac44 lftp-4.4.8-8.el7_3.2.x86_64.rpm     MD5: 0b652348f2bd3dfe1eab2ecc91993d94SHA-256: e4b37111e3fc9a74878efee3851a008767221f58881eefbddb49efa45f344735 lftp-debuginfo-4.4.8-8.el7_3.2.i686.rpm     MD5: ac4d066f1dcb96b1f86fdff80cddb75bSHA-256: cbb1b24d8634e201948ff37f9151c24d477aaa6aa75dfa27fc693adeac21c34f lftp-debuginfo-4.4.8-8.el7_3.2.x86_64.rpm     MD5: 03dbbaec1cff1109a04e672e9fd8784aSHA-256: 0319bbabf90cd63013f34a1e53e3e2a12377816c76d3597f761c6a2fce8093f5 lftp-scripts-4.4.8-8.el7_3.2.noarch.rpm     MD5: e79789c6edb6071e36fc6122e2f0b822SHA-256: fdfc4aa21162f78b957faaea845db97a29e5bb6e13bc4560d1c267789ff7eabf   Red Hat Enterprise Linux Server (v. 7) SRPMS: lftp-4.4.8-8.el7_3.2.src.rpm     MD5: 32b2fdf953c0e1a6463185b24b87953eSHA-256: f83a8f962c00fe8b4b357d15553fec8b8570b458cad649ea85dfd5106bbc3770   PPC: lftp-4.4.8-8.el7_3.2.ppc.rpm     MD5: 0d4e3899c45f7719a796e935ac9bec69SHA-256: 79c7fe8f24f7f10360541453a1f554f542d66d36d704a1f9e16b62e33805208e lftp-4.4.8-8.el7_3.2.ppc64.rpm     MD5: ef5ea105c9a7d01cc3c60ba89b984665SHA-256: efe7d81120d54733bc2d747a28fc15f8f590d05c140dd407ddb8cb722928a1ef lftp-debuginfo-4.4.8-8.el7_3.2.ppc.rpm     MD5: 27609feea0968a8b3b199470b3066f2fSHA-256: 14433614d5ecc5c87fa468300d79f524de735251c4642f33119aa413dac3fc73 lftp-debuginfo-4.4.8-8.el7_3.2.ppc64.rpm     MD5: 0746383af9ca3e9bc857a6ed300ab93cSHA-256: c31d9b8fd7a957714620292aeea8333b33ea6fb93d481e5a5f8f4307f5d0b47e lftp-scripts-4.4.8-8.el7_3.2.noarch.rpm     MD5: e79789c6edb6071e36fc6122e2f0b822SHA-256: fdfc4aa21162f78b957faaea845db97a29e5bb6e13bc4560d1c267789ff7eabf   PPC64LE: lftp-4.4.8-8.el7_3.2.ppc64le.rpm     MD5: 41f78266bd3d2ded60aad498296be9aaSHA-256: 437ac914567957cc645999b225181a291b472d8c283e16cea4c1f08aad6ad3a5 lftp-debuginfo-4.4.8-8.el7_3.2.ppc64le.rpm     MD5: c85f2d06b56520fd9d5de9b3ca7586ccSHA-256: bffae09d2b914f3d8b3d94b5478b39fe2bc83a85bcdc637d9698137fe5631d9b lftp-scripts-4.4.8-8.el7_3.2.noarch.rpm     MD5: e79789c6edb6071e36fc6122e2f0b822SHA-256: fdfc4aa21162f78b957faaea845db97a29e5bb6e13bc4560d1c267789ff7eabf   s390x: lftp-4.4.8-8.el7_3.2.s390.rpm     MD5: 2905cc336f49952d5ec21b8f0a0d0a0aSHA-256: da31820175d36b798be6830daf87f329dfd949f5da413dcc6043bccb1a8f3787 lftp-4.4.8-8.el7_3.2.s390x.rpm     MD5: 0d39a9c0b5bdf8deaa168b2d4d499a73SHA-256: 8f9ce2ef8ac5e871b6c0b7504baf50369ec8fcc5a58773fafe4d2719ae6b4a64 lftp-debuginfo-4.4.8-8.el7_3.2.s390.rpm     MD5: 4c9767cd4de6e4eb9b02c39cb4a21466SHA-256: 8186d99f918622bae44cb3c3672e159d4b187ae02d78ebe40e767c1ea1e52a99 lftp-debuginfo-4.4.8-8.el7_3.2.s390x.rpm     MD5: 7b81e54713b1eea893fb0a70b1d37913SHA-256: bf80c5b99f0bcc65848e095f5484661dc5181d81d23c3ee9ef7851181ed3802a lftp-scripts-4.4.8-8.el7_3.2.noarch.rpm     MD5: e79789c6edb6071e36fc6122e2f0b822SHA-256: fdfc4aa21162f78b957faaea845db97a29e5bb6e13bc4560d1c267789ff7eabf   x86_64: lftp-4.4.8-8.el7_3.2.i686.rpm     MD5: 7dac04214f0cc5fb942ee79ae9cdba7cSHA-256: cf34037dc04a8758b906fda491361501c6d53bcdc842d45512faac889cf2ac44 lftp-4.4.8-8.el7_3.2.x86_64.rpm     MD5: 0b652348f2bd3dfe1eab2ecc91993d94SHA-256: e4b37111e3fc9a74878efee3851a008767221f58881eefbddb49efa45f344735 lftp-debuginfo-4.4.8-8.el7_3.2.i686.rpm     MD5: ac4d066f1dcb96b1f86fdff80cddb75bSHA-256: cbb1b24d8634e201948ff37f9151c24d477aaa6aa75dfa27fc693adeac21c34f lftp-debuginfo-4.4.8-8.el7_3.2.x86_64.rpm     MD5: 03dbbaec1cff1109a04e672e9fd8784aSHA-256: 0319bbabf90cd63013f34a1e53e3e2a12377816c76d3597f761c6a2fce8093f5 lftp-scripts-4.4.8-8.el7_3.2.noarch.rpm     MD5: e79789c6edb6071e36fc6122e2f0b822SHA-256: fdfc4aa21162f78b957faaea845db97a29e5bb6e13bc4560d1c267789ff7eabf   Red Hat Enterprise Linux Server TUS (v. 7.3) SRPMS: lftp-4.4.8-8.el7_3.2.src.rpm     MD5: 32b2fdf953c0e1a6463185b24b87953eSHA-256: f83a8f962c00fe8b4b357d15553fec8b8570b458cad649ea85dfd5106bbc3770   x86_64: lftp-4.4.8-8.el7_3.2.i686.rpm     MD5: 7dac04214f0cc5fb942ee79ae9cdba7cSHA-256: cf34037dc04a8758b906fda491361501c6d53bcdc842d45512faac889cf2ac44 lftp-4.4.8-8.el7_3.2.x86_64.rpm     MD5: 0b652348f2bd3dfe1eab2ecc91993d94SHA-256: e4b37111e3fc9a74878efee3851a008767221f58881eefbddb49efa45f344735 lftp-debuginfo-4.4.8-8.el7_3.2.i686.rpm     MD5: ac4d066f1dcb96b1f86fdff80cddb75bSHA-256: cbb1b24d8634e201948ff37f9151c24d477aaa6aa75dfa27fc693adeac21c34f lftp-debuginfo-4.4.8-8.el7_3.2.x86_64.rpm     MD5: 03dbbaec1cff1109a04e672e9fd8784aSHA-256: 0319bbabf90cd63013f34a1e53e3e2a12377816c76d3597f761c6a2fce8093f5 lftp-scripts-4.4.8-8.el7_3.2.noarch.rpm     MD5: e79789c6edb6071e36fc6122e2f0b822SHA-256: fdfc4aa21162f78b957faaea845db97a29e5bb6e13bc4560d1c267789ff7eabf   Red Hat Enterprise Linux Workstation (v. 7) SRPMS: lftp-4.4.8-8.el7_3.2.src.rpm     MD5: 32b2fdf953c0e1a6463185b24b87953eSHA-256: f83a8f962c00fe8b4b357d15553fec8b8570b458cad649ea85dfd5106bbc3770   x86_64: lftp-4.4.8-8.el7_3.2.i686.rpm     MD5: 7dac04214f0cc5fb942ee79ae9cdba7cSHA-256: cf34037dc04a8758b906fda491361501c6d53bcdc842d45512faac889cf2ac44 lftp-4.4.8-8.el7_3.2.x86_64.rpm     MD5: 0b652348f2bd3dfe1eab2ecc91993d94SHA-256: e4b37111e3fc9a74878efee3851a008767221f58881eefbddb49efa45f344735 lftp-debuginfo-4.4.8-8.el7_3.2.i686.rpm     MD5: ac4d066f1dcb96b1f86fdff80cddb75bSHA-256: cbb1b24d8634e201948ff37f9151c24d477aaa6aa75dfa27fc693adeac21c34f lftp-debuginfo-4.4.8-8.el7_3.2.x86_64.rpm     MD5: 03dbbaec1cff1109a04e672e9fd8784aSHA-256: 0319bbabf90cd63013f34a1e53e3e2a12377816c76d3597f761c6a2fce8093f5 lftp-scripts-4.4.8-8.el7_3.2.noarch.rpm     MD5: e79789c6edb6071e36fc6122e2f0b822SHA-256: fdfc4aa21162f78b957faaea845db97a29e5bb6e13bc4560d1c267789ff7eabf   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from: