=== ANCHOR POEM === ════════════════════════════════════════════════════════─────────────────────────── you know how SSH password login is deprecated because the password needs to be transmitted in cleartext or whatever? what if we just... required two passwords? the first initiates the conversation, and sets up an encrypted line. It doesn't matter if anyone sees the first password because they'll get a new set of encrypted keys, meaning each session automatically is encrypted in a different, randomized way. the second password is the one that actually authenticates you. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘ === SIMILARITY RANKED === --- #1 fediverse/3470 --- ════════════════════════════════════════════════════════─────────────────────────── alternatively, when you initiate an SSH session it sends you a randomized public key whose private key is the password that you need to login. By decrypting the string of text it sent you and sending it back (plus the password at the end or whatever) you can ensure secure authentication without bothering with the passwordless keys which are wayyyyyy more trouble than they're worth and lack the "something you know" authentication method. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘ --- #2 fediverse/1310 --- ════════════════════════════════════════════════─────────────────────────────────── that feeling when you type your password so fast that one hand is faster than the other and the letters get all jumbled and now you have to remake your ssh key -.- ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════──────────────────────────────────┘ --- #3 fediverse/2674 --- ══════════════════════════════════════════════════════───────────────────────────── ┌────────────────────────────────────────────────────────────────────┐ │ CW: factually-untrue,-that-never-happened.-this-is-just-gesturing. │ └────────────────────────────────────────────────────────────────────┘ the kind of friendship where you SSH into each other's systems and leave notes for one another. as soon as you find one you message the person who left it like "yoooo only just found this lol" and they're like oooo yeah did you see the bash script I wrote in that directory "yeah totally I used it on one of my video files just now - cool filter!" ahhhh reminds me of all the times hackers have hacked my permanently insecure system and left me friendly messages like "hey I'm on your side" or "how's life, friend? I hope it's going well." or "never forget; you are worth all the fear" y'know cute things like that oh. right. because leaving vulnerabilities like that can lead to threat actors affecting your stuff. how lame. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════────────────────────────────┘ --- #4 fediverse/874 --- ══════════════════════════════════════════════───────────────────────────────────── oh yeah well if SSH keys are so secure then why doesn't every website on Earth require them really though why doesn't every website on Earth require them ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════────────────────────────────────────┘ --- #5 fediverse/3668 --- ════════════════════════════════════════════════════════─────────────────────────── setting up an SSH server is like a rite of passage for Linux administrators (notice I didn't say users, you can't use linux, only administer it) ... I'm having trouble with my rites >.> ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘ --- #6 fediverse/5109 --- ═══════════════════════════════════════════════════════════════════──────────────── does anyone know of a website where I can host videos on my neocities that isn't youtube? maybe something I can set up on my own server computer at home like a file server or something? how do I do that, what should I google, which is the easiest and closest to the metal tools I can use? [practical, sensible, courageous. these are the adjectives we need.] ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧════════════════════════════════════════════════════════════───────────────┘ --- #7 fediverse/1261 --- ╔═══════════════════════════════════════════════───────────────────────────────────┐ ║ sometimes I run this WoW server with only like, 10 username and passwords. And │ ║ they're all public. As far as I can tell nobody's ever tried connecting │ ║ (whatever >.> ) but rather than set up a way to create your own │ ║ credentials I just said "yeah pick one at random and play whatever someone │ ║ else was doing because I like the idea of that" │ ║ │ ║ somehow, it felt right. │ ║ │ ║ most of my passwords (not all of them) are hacked and visible on the clear │ ║ net. Like you could probably google my usernames and get my current passwords │ ║ for things like, social media or my banks or whatever. I kinda like the idea │ ║ that "you cannot trust anything I say, so think of the ideas behind my words │ ║ and decide whether they hold meaning to you" rather than "execute these │ ║ particular thought patterns in your mind as if they came from my voice" │ ║ because one implies an exertion of control over the mind of the recipient │ ║ -> obey my thoughts as I broadcast them into your mind, that kinda vibe. │ ║ And I feel like you have to consent to that kind of thing hehe │ ╟─────────┐ ┌───────────┤ ║ similar │ chronological │ different │ ╚═════════╧════════════════════════════════════────────────────────────┴──────────┘ --- #8 fediverse/2622 --- ══════════════════════════════════════════════════════───────────────────────────── what kind of linux user are you if you don't even like reading terminal output? it's USEFUL and INTERESTING information! WHY ELSE WOULD THE PROGRAMMER OUTPUT IT??? ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════────────────────────────────┘ --- #9 fediverse/4946 --- ════════════════════════════════════════════════════════════════─────────────────── I would trust the CIA if they gave me continual access to all surveillance of myself -- stack overflow -- what if you made a program which cycled credentials? like... "give me a random credential for Zoom" because we share all of our digital resources did you get banned for account sharing? no you didn't because you routed through the correct VPN automagically [has never had a software job] ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════════════──────────────────┘ --- #10 messages/181 --- ══════════════════════════════════════════════───────────────────────────────────── I know you don't want to hear this, but there is a chance that there will come a time where your life depends on your ability to debug a computer without the internet. To set up an SSH server. To install Linux. To program in C. To do something else that I'm not prepared for... If StackOverflow didn't exist because network connectivity has been lost, could you remember syntax? Maybe it's a good idea to set up a local LLM that can answer basic questions about technology. Maybe it's a good idea to set up on your parents computer, just in case you have to hide out there for a couple months. Maybe it's a good idea to download wikipedia, just in case. If I need to use a mac, I'm screwed ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════────────────────────────────────────┘ --- #11 fediverse/4869 --- ════════════════════════════════════════════════════════════════─────────────────── https://cryptpad.fr/pad/#/2/pad/view/FlA92SW5bVwGd+L89yV9U0I0SMNiGm3P0P3xS7DqYm A/embed/ ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════════════──────────────────┘ --- #12 fediverse/3471 --- ════════════════════════════════════════════════════════─────────────────────────── @user-883 it might be, I don't know much about it (hence why I'm asking questions) but I have heard that ssh keys are more secure than password authentication and it never made sense to me. If availability is important for security purposes, then wouldn't SSH keys (which are much more difficult to carry around than a password) be less suitable? ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘ --- #13 fediverse/466 --- ═════════════════════════════════════════════────────────────────────────────────── I love Linux. All I have to do is type "authserver" and "worldserver" and wouldn't you know it suddenly a universe is created (with very constrained rules) that anyone might inhabit should they desire to. It's not like I'm perfect - oh wait I have a toot about that, gimme a sec ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧══════════════════════════════════════─────────────────────────────────────┘ --- #14 fediverse/3407 --- ════════════════════════════════════════════════════════─────────────────────────── @user-1218 there's only a password so that if the zip archive is displaced from it's context it's harder to read. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘ --- #15 fediverse/3627 --- ════════════════════════════════════════════════════════─────────────────────────── ┌────────────────────────────┐ │ CW: computer-toucher-stuff │ └────────────────────────────┘ "why putting SSH on a port other than 22 is a bad idea" https://www.adayinthelifeof.nl/2012/03/12/why-putting-ssh-on-another-port-than- 22-is-bad-idea/ "When you are logged onto a system as a non-root user you cannot create a listing TCP or UDP port below 1024. This is because port numbers below 1024 are so-called privileged ports and can only be opened by root or processes that are running as root." thoughts? ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘ --- #16 fediverse_boost/3867 --- ◀─╔═══════════════════════[BOOST]════════════════════════────────────────────────╗ ║ ┌────────────────────────────────────────────────────────────────────────────┐ ║ ║ │ I really hate "two factor" auth. Like, cool, I get it, it let's you pretend you can divest responsibility for security and recovery, but also it means dropping my phone too hard could be a life disrupting event so somehow I don't really feel like this is for my benefit. │ ║ ║ └────────────────────────────────────────────────────────────────────────────┘ ║ ╠─────────┐ ┌───────────╣ ║ similar │ chronological │ different ║ ╚═════════╧════════════════════════════════════════════────────────────┴───────╝─▶ --- #17 fediverse/3671 --- ════════════════════════════════════════════════════════─────────────────────────── Phew got SSH working! Turns out it was the fact that the authentication key was owned by root instead of ritz. Doh, how could I forget the thing that wasn't mentioned anywhere in my search queries. you didn't search query, you used chatGPT, which is why you were stuck for so long haha oh yeah ... now I should fix my obs, it won't record video for some reason. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═════════════════════════════════════════════════──────────────────────────┘ --- #18 fediverse/5919 --- ══════════════════════════════════════════════════════════════════════════───────── "but... why?" portable linux with buttons, great for pick-up-games or communication, can throw several in them in a backpack if you want clustered cooperation, they work as radios (if the signal reaches) and can transmit text (if you use a radial-style keyboard) [this is all just a pitch for... something, what, you want something? ha you'll find no things with me, I know nothing of antifa or whatever] ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧═══════════════════════════════════════════════════════════════════────────┘ --- #19 fediverse/6029 --- ═══════════════════════════════════════════════════════════════════════════──────── spilled water on my keyboard by living with a cat. it might be broken so I'm using a spare that my girlfriend lent me. if you're wondering why my password sounds different... ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘═════════╧╧════════════════════════════════════════════════════════════════════───────┘ --- #20 notes/environment-variables --- ═══════──────────────────────────────────────────────────────────────────────────── To edit environment variables: ~/.bashrc is for variables only accessible by the user. /etc/profile is for variables accessible by all users. /etc/environment is for variables accessible by anyone. ┌─────────┐ ┌───────────┐ │ similar │ chronological │ different │ ╘══════───┴╧───────────────────────────────────────────────────────────────────────────┘ |