Abstract:
We all use SSH on a more or less daily basis. More advanced users even have created a config file for their clients in order to spare some typos. So let us take you on a journey into the more “”peculiar”” features of SSH. From multi-factor authentication to jump hosts all the way to GPG and the use of SmartCards. Let us show you what SSH can do, if you invest some into configuring it.

Bio:
@maclemon: Sysadmin by trade, strong supporter of anonymity and privacy, that odd person doing strange things with Macs, Hackspace and community affiliations: Metalab; Chaos Computer Club Wien; BSidesVienna, Cocoaheads. Blog URL: https://maclemon.at/

@leyrer: Providing IT-Wizardry for money for over 20 years. Boldly managing systems where angels fear to tread. Easily distracted by everything shiny and blinky. Hackspace and community affiliations: Metalab; Chaos Computer Club Wien; BSidesVienna.

Comments are closed.