July 1st, 2024

Protecting sshd using spiped (2012)

The article highlights spiped as a secure pipe daemon to protect sshd, offering a simpler alternative to 'ssh -L' by establishing a pre-shared secret key between hosts. Spiped enhances server security efficiently.

Read original articleLink Icon
Protecting sshd using spiped (2012)

The article discusses the use of spiped, a secure pipe daemon, as a way to protect sshd and restrict access to the SSH daemon. Spiped offers a simpler alternative to 'ssh -L' by allowing the establishment of a pre-shared secret key between hosts. By running spiped on a server, configured to accept connections on a different port and connect to the SSH port, administrators can firewall off the standard SSH port while still allowing secure connections globally. The introduction of spipe, a client for the spiped protocol, further simplifies the process by encrypting a single connection. By integrating spiped with other daemons, additional encryption and authentication can be added. The article emphasizes the UNIX philosophy of creating simple components that can be easily assembled to solve complex problems, with spiped being highlighted as a versatile tool for enhancing security in server setups.

Link Icon 2 comments
By @transpute - 5 months