<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Ssh on Linux Security</title><link>https://linuxtransfer.com/tags/ssh/</link><description>Recent content in Ssh on Linux Security</description><generator>Hugo</generator><language>en</language><lastBuildDate>Thu, 07 May 2026 10:25:40 +0200</lastBuildDate><atom:link href="https://linuxtransfer.com/tags/ssh/index.xml" rel="self" type="application/rss+xml"/><item><title>Using OpenSSH Certificates for Easier and More Secure Server Access</title><link>https://linuxtransfer.com/post/2026-05-07-using-openssh-certificates-for-easier-and-mor/</link><pubDate>Thu, 07 May 2026 10:25:40 +0200</pubDate><guid>https://linuxtransfer.com/post/2026-05-07-using-openssh-certificates-for-easier-and-mor/</guid><description>&lt;h2 id="introduction-to-openssh-certificates">Introduction to OpenSSH Certificates&lt;/h2>
&lt;p>I&amp;rsquo;ve seen many Linux admins struggle with managing SSH keys for their users. OpenSSH certificates are a game-changer here - they offer a more secure and convenient way to manage access to your Linux servers. By using certificates, you can avoid the hassle of managing individual SSH keys for each user and reduce the risk of key compromise.&lt;/p>
&lt;h2 id="generating-a-certificate-authority">Generating a Certificate Authority&lt;/h2>
&lt;p>To get started with OpenSSH certificates, you need to set up a Certificate Authority (CA). The CA will be used to sign and verify the certificates. I usually start with generating a CA key pair using the following command:&lt;/p></description></item><item><title>Hardening SSH Without Turning Your Server Into a Museum</title><link>https://linuxtransfer.com/post/2026-05-07-hardening-ssh-without-turning-your-server-int/</link><pubDate>Thu, 07 May 2026 03:02:48 +0200</pubDate><guid>https://linuxtransfer.com/post/2026-05-07-hardening-ssh-without-turning-your-server-int/</guid><description>&lt;h2 id="introduction-to-ssh-hardening">Introduction to SSH Hardening&lt;/h2>
&lt;p>Securing your SSH server is one of the most critical tasks as a Linux administrator. I&amp;rsquo;ve seen this go wrong when systems are left vulnerable to unauthorized access. The recent high-profile vulnerabilities discovered in popular SSH implementations in 2025 serve as a reminder to keep your SSH server up to date and configured securely. In this article, we&amp;rsquo;ll discuss practical steps to harden your SSH server without making it overly restrictive.&lt;/p></description></item></channel></rss>