<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Openssl on Linux Security</title><link>https://linuxtransfer.com/tags/openssl/</link><description>Recent content in Openssl on Linux Security</description><generator>Hugo</generator><language>en</language><lastBuildDate>Sat, 09 May 2026 08:45:28 +0200</lastBuildDate><atom:link href="https://linuxtransfer.com/tags/openssl/index.xml" rel="self" type="application/rss+xml"/><item><title>Using OpenSSL to Verify SSH Server Certificates on Linux Clients</title><link>https://linuxtransfer.com/post/2026-05-09-using-openssl-to-verify-ssh-server-certificat/</link><pubDate>Sat, 09 May 2026 08:45:28 +0200</pubDate><guid>https://linuxtransfer.com/post/2026-05-09-using-openssl-to-verify-ssh-server-certificat/</guid><description>&lt;h2 id="introduction-to-ssh-server-certificate-verification">Introduction to SSH Server Certificate Verification&lt;/h2>
&lt;p>As a Linux user, you&amp;rsquo;re probably no stranger to Secure Shell (SSH) and its importance in securely accessing remote servers. With the rise of SSH server certificates, I&amp;rsquo;ve seen this go wrong when not properly verified - it&amp;rsquo;s crucial to ensure the authenticity and integrity of your SSH connections. In this article, we&amp;rsquo;ll explore how to use OpenSSL to verify SSH server certificates on Linux clients.&lt;/p></description></item></channel></rss>