Groups | Search | Server Info | Login | Register
Groups > linux.debian.security > #6417
| From | Stephan Verbücheln <verbuecheln@posteo.de> |
|---|---|
| Newsgroups | linux.debian.security |
| Subject | Use ~/.ssh/config |
| Date | 2025-05-13 14:20 +0200 |
| Message-ID | <KLWM1-2Pst-3@gated-at.bofh.it> (permalink) |
| References | <KLUhb-2Nl7-11@gated-at.bofh.it> <KLVPY-2OQT-5@gated-at.bofh.it> |
| Organization | linux.* mail to news gateway |
[Multipart message — attachments visible in raw view] - view raw
On Tue, 2025-05-13 at 11:39 +0100, Chris Boot wrote: > I don't think that your software _should_ offer cipher selection > options to override SSH defaults at all, instead just using the > default options. I second this. This way, the secure defaults will evolve over time with future releases of OpenSSH and Debian. If necessary, I recommend to define non-default settings on a per-host basis in: ~/.ssh/config This is out of scope for rsync and Back in Time. Regards Stephan
Back to linux.debian.security | Previous | Next — Previous in thread | Find similar
SHH Cipher recommendations and "prohibitions" from Debian? c.buhtz@posteo.jp - 2025-05-13 11:40 +0200 Re: SHH Cipher recommendations and "prohibitions" from Debian? Bartosz Fenski <bartosz@fenski.pl> - 2025-05-13 12:50 +0200 Re: SHH Cipher recommendations and "prohibitions" from Debian? c.buhtz@posteo.jp - 2025-05-13 13:20 +0200 Use ~/.ssh/config Stephan Verbücheln <verbuecheln@posteo.de> - 2025-05-13 14:20 +0200
csiph-web