Sysop: | Amessyroom |
---|---|
Location: | Fayetteville, NC |
Users: | 28 |
Nodes: | 6 (1 / 5) |
Uptime: | 59:01:26 |
Calls: | 424 |
Calls today: | 2 |
Files: | 1,025 |
Messages: | 90,947 |
Posted today: | 1 |
Hi,
On Fri, Apr 11, 2025 at 08:12:14PM +0200, Marc SCHAEFER wrote:
systemd dependancies that are activated on a Debian system imply a lot
of library injections into sshd, much more than the stock OpenBSD ssh.
What do you think about this approach?
I think you're wasting your time and should not have sshd listen on the public Internet at all, instead VPN in to your network and only have
sshd available on the inside.
On 12/4/25 13:24, tomas@tuxteam.de wrote:
So, share your wisdom with us: what makes ssh less secure than
"a VPN"?
It's quite simple. If you have a VPN exposed to the internet and an ssh service then you have two attack surfaces in parallel. Breach either one and you breach the system
- you didn't explain how "a VPN's" mechanism is inherently more
secure than sshd's, given that their mechanisms are all pretty
similar.
- Your category "a VPN" is hopelessly too broad (that's why I
put it in quotes). What do you mean? IPSec? OpenVPN? Wireguard?
CIPE? Some proprietary thing (there are loads of them)?
Since security depends critically on implementation details and
the dedication of the group behind the software, the above is quite
relevant.
Hello,
Jumping into your interesting ssh vs VPN discussion:
I do not assume those kernel codes are unsafe, I am pretty sure they
have audited them. It just makes the attack surface much bigger.
sometimes, yes, I think [VPNs] are overblown compared to a "simple"
ssh server.
Wireguard, for example, is mostly kernel-side BTW.
I do not assume those kernel codes are unsafe, I am pretty sure they
have audited them. It just makes the attack surface much bigger.
On Wed, Apr 16, 2025 at 03:16:29AM CEST, Lee <ler762@gmail.com> said:
On Mon, Apr 14, 2025 at 10:27 AM Dan Purgert wrote:You stopped cups (ie the whole printing system), not cups-browsed (the mDNS listener to get printers of the local
On Apr 14, 2025, Marc SCHAEFER wrote:I'm not sure I understand, but
I wrote:Yep, 'cups-browsed' is the mDNS listener service (plugin for avahi?) so
If youActually, if you follow the discussion, the CUPS Bonjour auto-discovery >>>>
sudo systemctl disable cups # and maybe others
- it presumably handled by the cups-browsed package
(you can uninstall it, or systemctl disable it,
if you don't want printer auto-detection on your
network)
- it could also be handled by mDNS (?)
that cups can find printers announcing themselves via mDNS.
$ sudo systemctl stop cups.service
$ lp -d Canon_MG3600_series check-for-updates.sh
lp: Bad file descriptor
network announcing themselves by Zeroconf)
Hi Gene,
This is probably off topic for the subject of the thread above but -
You always claim that stuff is grossly broken: in this instance, CUPS
is probably *not* broken. The problem is that the free drivers - which
are essentially all that Debian can ship - are less functional than the proprietary drivers shipped by Brother.
On 4/16/25 03:14, Erwan David wrote:
On Wed, Apr 16, 2025 at 03:16:29AM CEST, Lee <ler762@gmail.com> said:
On Mon, Apr 14, 2025 at 10:27 AM Dan Purgert wrote:
On Apr 14, 2025, Marc SCHAEFER wrote:
Which brings up the fact that if cups-browsed is present, it disables the factory drivers which run my 2 brother printers flawlessly, every feature listed on the boxes Just Works, with the cups flavor of cups drivers which are grossly broken and have been for a decade or more. I lose tray choice, color is weak and afu on my color inkjet and my B&W laser loses duplex and doesn't properly respond to a formfeed.
Cheers, Gene Heskett, CET.
--
"There are four boxes to be used in defense of liberty:
soap, ballot, jury, and ammo. Please use in that order."
-Ed Howdershelt (Author, 1940)
If we desire respect for the law, we must first make the law respectable.
- Louis D. Brandeis