How to fix your hackable SSH on Debian and Ubuntu Servers

If you’re running debian or ubuntu, your ssh keys are vulnerable. Follow these steps to regenerate them and secure your box back up. apt-get update apt-get upgrade cd /etc/ssh/ rm ssh_host_dsa_key rm ssh_host_dsa_key.pub rm ssh_host_rsa_key rm ssh_host_rsa_key.pub ssh-keygen -t dsa (filename as /etc/ssh/ssh_host_dsa_key) ssh-keygen -t rsa (filename as /etc/ssh/ssh_host_rsa_key) /etc/init.d/ssh restart Comments Comment by Christopher DeMarco on 2008-05-15 15:11:28 -0500 This only fixes connections from this host to others. Inbound connections are still problematic!...

May 15, 2008 · 1 min · 120 words · Matt G

PfSense on a soekris instead of monowall notes

Requirements: Soekris NET4801 PfSense Embedded Image CF Reader Serial Cable for the soekris CF Card 256 MB The Steps I took: Backup your old Soekris / Monowall configuration xml file Buy a new CF card so we can keep the old configuration sane so it’s plug and play “back to working” incase pfsense doesn’t work Plug your cf reader into one of your linux boxes, and do this with the image...

April 23, 2007 · 2 min · 300 words · Matt G