Follow

RT @cyb3rops@twitter.com

TIL authorized_keys files can contain more than just public keys.
You can control source hosts of each key, limit the port forwarding, execute commands upon login.
In 20+ years of working on Unix/Linux systems, I've never seen this used.

commandlinux.com/man-page/man5

🐦🔗: twitter.com/cyb3rops/status/13

· · Mastodon Twitter Crossposter · 0 · 4 · 2
Sign in to participate in the conversation
Mastodon

Server run by the main developers of the project 🐘 It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!