@networkpro/web 0.12.5 → 0.13.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/404.html +1 -1
- package/README.md +22 -12
- package/about.html +71 -53
- package/about.html.br +0 -0
- package/about.html.gz +0 -0
- package/bundle-report.html +39 -0
- package/css/default.css +1 -1
- package/docs/assets/external/img.shields.io/badge/GitHub_Package_Registry-white.ed8def48.svg +1 -0
- package/docs/assets/external/img.shields.io/badge/npmjs-white.681714c1.svg +1 -0
- package/docs/blog/2015/01/04/secure-secure-shell/index.html +51 -38
- package/docs/blog/2025/04/30/our-blog-is-live/index.html +25 -18
- package/docs/blog/archive/2015/index.html +16 -9
- package/docs/blog/archive/2025/index.html +7 -6
- package/docs/blog/category/security/index.html +16 -9
- package/docs/blog/index.html +27 -19
- package/docs/feed_json_created.json +1 -1
- package/docs/feed_json_updated.json +1 -1
- package/docs/feed_rss_created.xml +1 -1
- package/docs/feed_rss_updated.xml +1 -1
- package/docs/index.html +31 -23
- package/docs/search/search_index.json +1 -1
- package/docs/sitemap.xml +13 -13
- package/docs/sitemap.xml.gz +0 -0
- package/docs/tags/index.html +3 -3
- package/html/spotlight.html +10 -10
- package/html/spotlight.html.br +0 -0
- package/html/spotlight.html.gz +0 -0
- package/img/linkedin-banner-new.png +0 -0
- package/img/qr/pgp-contact.png +0 -0
- package/index.html +36 -24
- package/index.html.br +0 -0
- package/index.html.gz +0 -0
- package/legal.html +22 -22
- package/legal.html.br +0 -0
- package/legal.html.gz +0 -0
- package/package.json +16 -13
- package/privacy.html +17 -16
- package/privacy.html.br +0 -0
- package/privacy.html.gz +0 -0
- package/sitemap.xml +67 -7
- package/terms-and-conditions.html +19 -19
- package/terms-and-conditions.html.br +0 -0
- package/terms-and-conditions.html.gz +0 -0
- package/terms-of-use.html +17 -16
- package/terms-of-use.html.br +0 -0
- package/terms-of-use.html.gz +0 -0
- package/docs/assets/external/github.com/netwk-pro/netwk-pro.github.io/actions/workflows/upload.yml/badge.svg +0 -35
- package/docs/assets/external/github.com/netwk-pro/netwk-pro.github.io/actions/workflows/webpack.yml/badge.56403977.svg +0 -35
- package/docs/assets/external/img.shields.io/badge/Contributor Covenant-2.1-4baaaa.svg +0 -1
- package/docs/assets/external/img.shields.io/badge/code_style-prettier-ff69b4.3e3c11fa.svg +0 -1
- package/docs/assets/external/img.shields.io/npm/v/@networkpro/web.5485edf3.svg +0 -1
package/css/default.css
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
.full-width-section{background-position:50%;background-size:cover;margin:0 auto;max-width:1920px;width:100%}.container{margin:0 auto;max-width:1200px;padding:0 12px}footer,header{width:100%}footer .container,header .container{margin:0 auto;max-width:1200px;padding:20px 12px}.gh{border-collapse:collapse;border-spacing:0;margin:0 auto}.gh td,.gh th{border-collapse:collapse;font-family:Arial,Helvetica,sans-serif;overflow:hidden;padding:10px 5px;word-break:normal}.gh .gh-tcell{text-align:center;vertical-align:middle}@media screen and (width <= 767px){.gh,.gh col{width:auto!important}.gh-wrap{margin:auto 0;-webkit-overflow-scrolling:touch;overflow-x:auto}}.soc{border-collapse:collapse;border-spacing:0;margin:0 auto}.soc td,.soc th{border-collapse:collapse;font-family:Arial,Helvetica,sans-serif;overflow:hidden;padding:8px;word-break:normal}.soc .soc-fa{text-align:center;vertical-align:middle}@media screen and (width <= 767px){.soc,.soc col{width:auto!important}.soc-wrap{margin:auto 0;-webkit-overflow-scrolling:touch;overflow-x:auto}}.foss{border-collapse:collapse;border-spacing:0}.foss td,.foss th{border-collapse:collapse;font-family:Arial,Helvetica,sans-serif;overflow:hidden;padding:10px 5px;word-break:normal}.foss .foss-cell{text-align:center;vertical-align:middle}@media screen and (width <= 767px){.foss,.foss col{width:auto!important}.foss-wrap{-webkit-overflow-scrolling:touch;overflow-x:auto}}.bnav{border-collapse:collapse;border-spacing:0;margin:0 auto}.bnav td{font-weight:700}.bnav td,.bnav th{border-style:none;font-family:Arial,Helvetica,sans-serif;font-size:.
|
|
1
|
+
.full-width-section{background-position:50%;background-size:cover;margin:0 auto;max-width:1920px;width:100%}.container{margin:0 auto;max-width:1200px;padding:0 12px}footer,header{width:100%}footer .container,header .container{margin:0 auto;max-width:1200px;padding:20px 12px}.gh{border-collapse:collapse;border-spacing:0;margin:0 auto}.gh td,.gh th{border-collapse:collapse;font-family:Arial,Helvetica,sans-serif;overflow:hidden;padding:10px 5px;word-break:normal}.gh .gh-tcell{text-align:center;vertical-align:middle}@media screen and (width <= 767px){.gh,.gh col{width:auto!important}.gh-wrap{margin:auto 0;-webkit-overflow-scrolling:touch;overflow-x:auto}}.soc{border-collapse:collapse;border-spacing:0;margin:0 auto}.soc td,.soc th{border-collapse:collapse;font-family:Arial,Helvetica,sans-serif;overflow:hidden;padding:8px;word-break:normal}.soc .soc-fa{text-align:center;vertical-align:middle}@media screen and (width <= 767px){.soc,.soc col{width:auto!important}.soc-wrap{margin:auto 0;-webkit-overflow-scrolling:touch;overflow-x:auto}}.foss{border-collapse:collapse;border-spacing:0}.foss td,.foss th{border-collapse:collapse;font-family:Arial,Helvetica,sans-serif;overflow:hidden;padding:10px 5px;word-break:normal}.foss .foss-cell{text-align:center;vertical-align:middle}@media screen and (width <= 767px){.foss,.foss col{width:auto!important}.foss-wrap{-webkit-overflow-scrolling:touch;overflow-x:auto}}.bnav{border-collapse:collapse;border-spacing:0;margin:0 auto}.bnav td{font-weight:700}.bnav td,.bnav th{border-style:none;font-family:Arial,Helvetica,sans-serif;font-size:.875rem;line-height:1.125rem;overflow:hidden;padding:10px;word-break:normal}.bnav .bnav-cell{align-content:center;text-align:center;vertical-align:middle}@media screen and (width <= 767px){.bnav,.bnav col{width:auto!important}.bnav-wrap{margin:auto 0;-webkit-overflow-scrolling:touch;overflow-x:auto}}.bnav2{border-collapse:collapse;border-spacing:0;margin:0 auto}.bnav2 td{font-weight:700;padding:10px}.bnav2 td,.bnav2 th{border-style:none;font-family:Arial,Helvetica,sans-serif;font-size:.875rem;line-height:1.125rem;overflow:hidden;word-break:normal}.bnav2 th{padding:12px}.bnav2 .bnav2-cell{align-content:center;text-align:center;vertical-align:middle}@media screen and (width <= 767px){.bnav2,.bnav2 col{width:auto!important}.bnav2-wrap{margin:auto 0;-webkit-overflow-scrolling:touch;overflow-x:auto}}.pgp{border-collapse:collapse;border-spacing:0;margin:0 auto}.pgp td{border-style:none;font-family:Arial,Helvetica,sans-serif}.pgp td,.pgp th{font-size:.875rem;line-height:1.125rem;overflow:hidden;padding:10px;word-break:normal}.pgp th{border:1px solid #000;font-family:Arial,sans-serif}.pgp .pgp-col1{text-align:right;vertical-align:middle}.pgp .pgp-col2{text-align:left;vertical-align:middle}@media screen and (width <= 767px){.pgp,.pgp col{width:auto!important}.pgp-wrap{margin:auto 0;-webkit-overflow-scrolling:touch;overflow-x:auto}}.logo{display:block;margin-left:auto;margin-right:auto}.index-title1{font-style:italic;font-weight:700;text-align:center}.index-title2{font-size:1.25rem;font-variant:small-caps;letter-spacing:-.015em;line-height:1.625rem;text-align:center}.index1{font-style:italic;font-weight:700;line-height:2.125rem}.index1,.index2{letter-spacing:-.035em;text-align:center}.index2{font-size:1.5rem;font-variant:small-caps;line-height:1.75rem}.index3{text-align:center}.index3,.subhead{font-size:1.5rem;letter-spacing:-.035em;line-height:1.75rem}.subhead{font-variant:small-caps}.bolditalic{font-style:italic;font-weight:700}.bquote{border-left:3px solid #9e9e9e;font-style:italic;margin-left:30px;padding-left:10px}.large-text{font-size:1.25rem;line-height:1.75rem}.small-text{font-size:.75rem;line-height:1.125rem}.large-text-center{font-size:1.25rem;line-height:1.75rem;text-align:center}.join{font-weight:700;text-align:center}.prewrap{display:block;white-space:pre-wrap}.remphasis{font-style:italic;font-weight:700}.hr-styled{margin:auto;width:75%}.center-text,.copyright{text-align:center}.copyright{font-size:.75rem;line-height:1.125rem}.visited{color:#7f6227}.center-nav{font-size:.875rem;padding:5px;text-align:center}.block,.center-nav{line-height:1.125rem}.block{background:none;border:none;border-radius:0;font-size:.75rem;outline:none;resize:none;width:100%}
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
<svg xmlns="http://www.w3.org/2000/svg" width="171" height="20" role="img" aria-label="GitHub Package Registry"><title>GitHub Package Registry</title><a target="_blank" href="https://www.npmjs.com/package/@networkpro/web"><linearGradient id="s" x2="0" y2="100%"><stop offset="0" stop-color="#bbb" stop-opacity=".1"/><stop offset="1" stop-opacity=".1"/></linearGradient><clipPath id="r"><rect width="171" height="20" rx="3" fill="#fff"/></clipPath><g clip-path="url(#r)"><rect width="24" height="20" fill="white"/><rect x="24" width="147" height="20" fill="#555"/><rect width="171" height="20" fill="url(#s)"/></g><g fill="#fff" text-anchor="middle" font-family="Verdana,Geneva,DejaVu Sans,sans-serif" text-rendering="geometricPrecision" font-size="110"><image x="5" y="3" width="14" height="14" href="data:image/svg+xml;base64,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"/><text aria-hidden="true" x="965" y="150" fill="#010101" fill-opacity=".3" transform="scale(.1)" textLength="1370">GitHub Package Registry</text><text x="965" y="140" transform="scale(.1)" fill="#fff" textLength="1370">GitHub Package Registry</text></g></a></svg>
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
<svg xmlns="http://www.w3.org/2000/svg" width="69" height="20" role="img" aria-label="npmjs"><title>npmjs</title><a target="_blank" href="https://www.npmjs.com/package/@networkpro/web"><linearGradient id="s" x2="0" y2="100%"><stop offset="0" stop-color="#bbb" stop-opacity=".1"/><stop offset="1" stop-opacity=".1"/></linearGradient><clipPath id="r"><rect width="69" height="20" rx="3" fill="#fff"/></clipPath><g clip-path="url(#r)"><rect width="24" height="20" fill="white"/><rect x="24" width="45" height="20" fill="#555"/><rect width="69" height="20" fill="url(#s)"/></g><g fill="#fff" text-anchor="middle" font-family="Verdana,Geneva,DejaVu Sans,sans-serif" text-rendering="geometricPrecision" font-size="110"><image x="5" y="3" width="14" height="14" href="data:image/svg+xml;base64,PHN2ZyBmaWxsPSIjY2IzODM3IiByb2xlPSJpbWciIHZpZXdCb3g9IjAgMCAyNCAyNCIgeG1sbnM9Imh0dHA6Ly93d3cudzMub3JnLzIwMDAvc3ZnIj48dGl0bGU+bnBtPC90aXRsZT48cGF0aCBkPSJNMS43NjMgMEMuNzg2IDAgMCAuNzg2IDAgMS43NjN2MjAuNDc0QzAgMjMuMjE0Ljc4NiAyNCAxLjc2MyAyNGgyMC40NzRjLjk3NyAwIDEuNzYzLS43ODYgMS43NjMtMS43NjNWMS43NjNDMjQgLjc4NiAyMy4yMTQgMCAyMi4yMzcgMHpNNS4xMyA1LjMyM2wxMy44MzcuMDE5LS4wMDkgMTMuODM2aC0zLjQ2NGwuMDEtMTAuMzgyaC0zLjQ1NkwxMi4wNCAxOS4xN0g1LjExM3oiLz48L3N2Zz4="/><text aria-hidden="true" x="455" y="150" fill="#010101" fill-opacity=".3" transform="scale(.1)" textLength="350">npmjs</text><text x="455" y="140" transform="scale(.1)" fill="#fff" textLength="350">npmjs</text></g></a></svg>
|
|
@@ -1075,7 +1075,7 @@
|
|
|
1075
1075
|
<li class="md-nav__item">
|
|
1076
1076
|
<div class="md-nav__link">
|
|
1077
1077
|
<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path d="M15 13h1.5v2.82l2.44 1.41-.75 1.3L15 16.69zm4-5H5v11h4.67c-.43-.91-.67-1.93-.67-3a7 7 0 0 1 7-7c1.07 0 2.09.24 3 .67zM5 21a2 2 0 0 1-2-2V5c0-1.11.89-2 2-2h1V1h2v2h8V1h2v2h1a2 2 0 0 1 2 2v6.1c1.24 1.26 2 2.99 2 4.9a7 7 0 0 1-7 7c-1.91 0-3.64-.76-4.9-2zm11-9.85A4.85 4.85 0 0 0 11.15 16c0 2.68 2.17 4.85 4.85 4.85A4.85 4.85 0 0 0 20.85 16c0-2.68-2.17-4.85-4.85-4.85"/></svg>
|
|
1078
|
-
<time datetime="2025-04
|
|
1078
|
+
<time datetime="2025-05-04 00:00:00+00:00" class="md-ellipsis">May 4, 2025</time>
|
|
1079
1079
|
</div>
|
|
1080
1080
|
</li>
|
|
1081
1081
|
|
|
@@ -1143,15 +1143,22 @@
|
|
|
1143
1143
|
<h1 id="secure-secure-shell">Secure Secure Shell</h1>
|
|
1144
1144
|
<!-- markdownlint-disable-file -->
|
|
1145
1145
|
|
|
1146
|
-
<
|
|
1147
|
-
|
|
1148
|
-
https://
|
|
1149
|
-
|
|
1150
|
-
|
|
1151
|
-
|
|
1152
|
-
|
|
1153
|
-
|
|
1154
|
-
</
|
|
1146
|
+
<div style="font-size: small; font-style: italic;">
|
|
1147
|
+
|
|
1148
|
+
> **Originally published on 1/4/2015 by [stribika](https://github.com/stribika) at:
|
|
1149
|
+
> [https://blog.stribik.technology/2015/01/04/secure-secure-shell.html](https://blog.stribik.technology/2015/01/04/secure-secure-shell.html)**
|
|
1150
|
+
>
|
|
1151
|
+
> Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:
|
|
1152
|
+
> <https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices>
|
|
1153
|
+
|
|
1154
|
+
</div>
|
|
1155
|
+
|
|
1156
|
+
<div style="font-size: small;">
|
|
1157
|
+
|
|
1158
|
+
> > 📝 **_NOTE:_** Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.
|
|
1159
|
+
|
|
1160
|
+
</div>
|
|
1161
|
+
|
|
1155
1162
|
<ul>
|
|
1156
1163
|
<li><a href="#sshd">Skip to the good part.</a></li>
|
|
1157
1164
|
</ul>
|
|
@@ -1201,22 +1208,22 @@ k = KDF(s) k = KDF(s)</code></pre></p>
|
|
|
1201
1208
|
<hr />
|
|
1202
1209
|
<h2 id="sshd-configuration"><a id="sshd">SSHD Configuration</a></h2>
|
|
1203
1210
|
<blockquote>
|
|
1204
|
-
<p>Emphasis added, it was not present in the originally published article.<br />
|
|
1205
|
-
Key exchange <strong>1</strong> (curve25519-sha256) is ideal, <strong>8</strong> is also acceptable.</p>
|
|
1211
|
+
<p><strong><em>NOTE:</em></strong> Emphasis added, it was not present in the originally published article.<br />
|
|
1212
|
+
Key exchange <strong>1</strong> (curve25519-sha256) alone is ideal, <strong>8</strong> is also acceptable for interoperability.</p>
|
|
1206
1213
|
</blockquote>
|
|
1207
1214
|
<p>OpenSSH supports 11 key exchange protocols:</p>
|
|
1208
1215
|
<ol>
|
|
1209
1216
|
<li><strong><a href="https://git.libssh.org/projects/libssh.git/tree/doc/curve25519-sha256@libssh.org.txt">curve25519-sha256</a>: ECDH over <a href="https://cr.yp.to/ecdh.html">Curve25519</a> with SHA2</strong></li>
|
|
1210
|
-
<li
|
|
1211
|
-
<li
|
|
1217
|
+
<li><a href="https://www.ietf.org/rfc/rfc4253.txt">diffie-hellman-group1-sha1</a>: 1024 bit DH with SHA1</li>
|
|
1218
|
+
<li><a href="https://www.ietf.org/rfc/rfc4253.txt">diffie-hellman-group14-sha1</a>: 2048 bit DH with SHA1</li>
|
|
1212
1219
|
<li><a href="https://tools.ietf.org/html/draft-ietf-curdle-ssh-modp-dh-sha2-09">diffie-hellman-group14-sha256</a>: 2048 bit DH with SHA2</li>
|
|
1213
1220
|
<li><a href="https://tools.ietf.org/html/draft-ietf-curdle-ssh-modp-dh-sha2-09">diffie-hellman-group16-sha512</a>: 4096 bit DH with SHA2</li>
|
|
1214
1221
|
<li><a href="https://tools.ietf.org/html/draft-ietf-curdle-ssh-modp-dh-sha2-09">diffie-hellman-group18-sha512</a>: 8192 bit DH with SHA2</li>
|
|
1215
|
-
<li
|
|
1222
|
+
<li><a href="https://www.ietf.org/rfc/rfc4419.txt">diffie-hellman-group-exchange-sha1</a>: Custom DH with SHA1</li>
|
|
1216
1223
|
<li><strong><em><a href="https://www.ietf.org/rfc/rfc4419.txt">diffie-hellman-group-exchange-sha256</a>: Custom DH with SHA2</em></strong></li>
|
|
1217
|
-
<li
|
|
1218
|
-
<li
|
|
1219
|
-
<li
|
|
1224
|
+
<li>ecdh-sha2-nistp256: ECDH over NIST P-256 with SHA2</li>
|
|
1225
|
+
<li>ecdh-sha2-nistp384: ECDH over NIST P-384 with SHA2</li>
|
|
1226
|
+
<li>ecdh-sha2-nistp521: ECDH over NIST P-521 with SHA2</li>
|
|
1220
1227
|
</ol>
|
|
1221
1228
|
<p>We have to look at 3 things here:</p>
|
|
1222
1229
|
<ul>
|
|
@@ -1233,6 +1240,9 @@ Key exchange <strong>1</strong> (curve25519-sha256) is ideal, <strong>8</strong>
|
|
|
1233
1240
|
</ul>
|
|
1234
1241
|
<p>We are left with <strong>1</strong> and <strong>8</strong>, as well as <strong>4-6</strong> which were added in <a href="https://www.openssh.com/releasenotes.html#7.3">OpenSSH 7.3</a>.
|
|
1235
1242
|
<strong>1</strong> is better and it's perfectly OK to only support that but for interoperability (with Eclipse, WinSCP), <strong>8</strong> can be included.</p>
|
|
1243
|
+
<blockquote>
|
|
1244
|
+
<p><strong><em>NOTE:</em></strong>: 8 should no longer be necessary in newer versions of WinSCP. If in doubt, test with only 1 first. Add 8 if it won't connect otherwise.</p>
|
|
1245
|
+
</blockquote>
|
|
1236
1246
|
<p>Recommended <code>/etc/ssh/sshd_config</code> snippet:</p>
|
|
1237
1247
|
<pre><code id="server-kex">KexAlgorithms curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256</code></pre>
|
|
1238
1248
|
|
|
@@ -1244,6 +1254,9 @@ Key exchange <strong>1</strong> (curve25519-sha256) is ideal, <strong>8</strong>
|
|
|
1244
1254
|
Host *
|
|
1245
1255
|
KexAlgorithms curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256</code></pre>
|
|
1246
1256
|
|
|
1257
|
+
<blockquote>
|
|
1258
|
+
<p><strong><em>NOTE:</em></strong> GitHub should no longer need a separate setting, as they've transitioned away from SSH keys. They should not require an exception regardless.</p>
|
|
1259
|
+
</blockquote>
|
|
1247
1260
|
<p>If you chose to enable <strong>8</strong>, open <code>/etc/ssh/moduli</code> if exists, and delete lines where the 5th column is less than 2000.</p>
|
|
1248
1261
|
<pre><code id="server-moduli-filter">awk '$5 > 2000' /etc/ssh/moduli > "${HOME}/moduli"
|
|
1249
1262
|
wc -l "${HOME}/moduli" # make sure there is something left
|
|
@@ -1330,25 +1343,25 @@ You can also use a <a href="https://www.cl.cam.ac.uk/~mgk25/otpw.html">printed l
|
|
|
1330
1343
|
<hr />
|
|
1331
1344
|
<h2 id="symmetric-ciphers">Symmetric ciphers</h2>
|
|
1332
1345
|
<blockquote>
|
|
1333
|
-
<p>Emphasis added.</p>
|
|
1346
|
+
<p><strong><em>NOTE:</em></strong> Emphasis added.</p>
|
|
1334
1347
|
</blockquote>
|
|
1335
1348
|
<p>Symmetric ciphers are used to encrypt the data after the initial key exchange and authentication is complete.</p>
|
|
1336
1349
|
<p>Here we have quite a few algorithms (10-14 were removed in <a href="https://www.openssh.com/releasenotes.html#7.6">OpenSSH 7.6</a>):</p>
|
|
1337
1350
|
<ol>
|
|
1338
|
-
<li
|
|
1339
|
-
<li
|
|
1340
|
-
<li
|
|
1341
|
-
<li
|
|
1351
|
+
<li>3des-cbc</li>
|
|
1352
|
+
<li>aes128-cbc</li>
|
|
1353
|
+
<li>aes192-cbc</li>
|
|
1354
|
+
<li>aes256-cbc</li>
|
|
1342
1355
|
<li>aes128-ctr</li>
|
|
1343
1356
|
<li>aes192-ctr</li>
|
|
1344
1357
|
<li>aes256-ctr</li>
|
|
1345
1358
|
<li><strong><em><a href="mailto:aes128-gcm@openssh.com">aes128-gcm@openssh.com</a></em></strong></li>
|
|
1346
1359
|
<li><strong><em><a href="mailto:aes256-gcm@openssh.com">aes256-gcm@openssh.com</a></em></strong></li>
|
|
1347
|
-
<li
|
|
1348
|
-
<li
|
|
1349
|
-
<li
|
|
1350
|
-
<li
|
|
1351
|
-
<li
|
|
1360
|
+
<li>arcfour</li>
|
|
1361
|
+
<li>arcfour128</li>
|
|
1362
|
+
<li>arcfour256</li>
|
|
1363
|
+
<li>blowfish-cbc</li>
|
|
1364
|
+
<li>cast128-cbc</li>
|
|
1352
1365
|
<li><strong><a href="mailto:chacha20-poly1305@openssh.com">chacha20-poly1305@openssh.com</a></strong></li>
|
|
1353
1366
|
</ol>
|
|
1354
1367
|
<p>We have to consider the following:</p>
|
|
@@ -1404,21 +1417,21 @@ It's even worse because no one said that a MAC's output can't leak what its inpu
|
|
|
1404
1417
|
SSH by default, uses this method.</p>
|
|
1405
1418
|
<p>Here are the available MAC choices:</p>
|
|
1406
1419
|
<ol>
|
|
1407
|
-
<li
|
|
1408
|
-
<li
|
|
1409
|
-
<li
|
|
1410
|
-
<li
|
|
1420
|
+
<li>hmac-md5</li>
|
|
1421
|
+
<li>hmac-md5-96</li>
|
|
1422
|
+
<li>hmac-sha1</li>
|
|
1423
|
+
<li>hmac-sha1-96</li>
|
|
1411
1424
|
<li>hmac-sha2-256</li>
|
|
1412
1425
|
<li>hmac-sha2-512</li>
|
|
1413
|
-
<li
|
|
1426
|
+
<li>umac-64</li>
|
|
1414
1427
|
<li>umac-128</li>
|
|
1415
|
-
<li
|
|
1416
|
-
<li
|
|
1417
|
-
<li
|
|
1418
|
-
<li
|
|
1428
|
+
<li><a href="mailto:hmac-md5-etm@openssh.com">hmac-md5-etm@openssh.com</a></li>
|
|
1429
|
+
<li><a href="mailto:hmac-md5-96-etm@openssh.com">hmac-md5-96-etm@openssh.com</a></li>
|
|
1430
|
+
<li><a href="mailto:hmac-sha1-etm@openssh.com">hmac-sha1-etm@openssh.com</a></li>
|
|
1431
|
+
<li><a href="mailto:hmac-sha1-96-etm@openssh.com">hmac-sha1-96-etm@openssh.com</a></li>
|
|
1419
1432
|
<li><strong><a href="mailto:hmac-sha2-256-etm@openssh.com">hmac-sha2-256-etm@openssh.com</a></strong></li>
|
|
1420
1433
|
<li><strong><a href="mailto:hmac-sha2-512-etm@openssh.com">hmac-sha2-512-etm@openssh.com</a></strong></li>
|
|
1421
|
-
<li
|
|
1434
|
+
<li><a href="mailto:umac-64-etm@openssh.com">umac-64-etm@openssh.com</a></li>
|
|
1422
1435
|
<li><a href="mailto:umac-128-etm@openssh.com">umac-128-etm@openssh.com</a></li>
|
|
1423
1436
|
</ol>
|
|
1424
1437
|
<p>The selection considerations:</p>
|
|
@@ -1131,6 +1131,13 @@
|
|
|
1131
1131
|
</div>
|
|
1132
1132
|
</li>
|
|
1133
1133
|
|
|
1134
|
+
<li class="md-nav__item">
|
|
1135
|
+
<div class="md-nav__link">
|
|
1136
|
+
<svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24"><path d="M15 13h1.5v2.82l2.44 1.41-.75 1.3L15 16.69zm4-5H5v11h4.67c-.43-.91-.67-1.93-.67-3a7 7 0 0 1 7-7c1.07 0 2.09.24 3 .67zM5 21a2 2 0 0 1-2-2V5c0-1.11.89-2 2-2h1V1h2v2h8V1h2v2h1a2 2 0 0 1 2 2v6.1c1.24 1.26 2 2.99 2 4.9a7 7 0 0 1-7 7c-1.91 0-3.64-.76-4.9-2zm11-9.85A4.85 4.85 0 0 0 11.15 16c0 2.68 2.17 4.85 4.85 4.85A4.85 4.85 0 0 0 20.85 16c0-2.68-2.17-4.85-4.85-4.85"/></svg>
|
|
1137
|
+
<time datetime="2025-05-05 00:00:00+00:00" class="md-ellipsis">May 5, 2025</time>
|
|
1138
|
+
</div>
|
|
1139
|
+
</li>
|
|
1140
|
+
|
|
1134
1141
|
|
|
1135
1142
|
|
|
1136
1143
|
|
|
@@ -1188,38 +1195,38 @@
|
|
|
1188
1195
|
<!-- markdownlint-disable-file -->
|
|
1189
1196
|
|
|
1190
1197
|
<h2 id="welcome-to-the-network-protm-blog-cybersecurity-privacy-open-knowledge">🛡️ Welcome to the Network Pro™ Blog: Cybersecurity. Privacy. Open Knowledge.</h2>
|
|
1191
|
-
<p>In
|
|
1192
|
-
<p>Today
|
|
1198
|
+
<p>In a digital world where threats are persistent and privacy is too often an afterthought, <strong>Network Pro Strategies</strong> was founded on a belief that <strong>effective security doesn't require compromise</strong>. We specialize in helping organizations and individuals <strong>navigate today’s cybersecurity challenges with confidence, clarity, and control</strong>.</p>
|
|
1199
|
+
<p>Today marks the launch of our official blog—your go-to destination for <strong>field-tested strategies, implementation insights, and transparent thought leadership</strong> across cybersecurity, network defense, and privacy-aware infrastructure.</p>
|
|
1193
1200
|
<hr />
|
|
1194
1201
|
<h3 id="why-this-blog-exists">📡 Why This Blog Exists</h3>
|
|
1195
|
-
<p>
|
|
1202
|
+
<p>Modern security isn’t just about technology—it’s about <strong>trust, autonomy, and informed choices</strong>. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.</p>
|
|
1203
|
+
<p>This blog represents our commitment to providing value through:</p>
|
|
1196
1204
|
<ul>
|
|
1197
|
-
<li>💼 <strong>SMBs and enterprises</strong>
|
|
1198
|
-
<li>🏛️ <strong>Government and
|
|
1199
|
-
<li>👨💻 <strong>
|
|
1205
|
+
<li>💼 <strong>SMBs and enterprises</strong> needing tailored, scalable security that protects business continuity</li>
|
|
1206
|
+
<li>🏛️ <strong>Government and compliance-sensitive sectors</strong> where resilience and data integrity are mission-critical</li>
|
|
1207
|
+
<li>👨💻 <strong>Technologists and privacy-conscious communities</strong> seeking reliable strategies and tools that don’t trade transparency for control</li>
|
|
1200
1208
|
</ul>
|
|
1201
1209
|
<!-- more -->
|
|
1202
1210
|
|
|
1203
1211
|
<hr />
|
|
1204
1212
|
<h3 id="what-youll-find-here">📬 What You’ll Find Here</h3>
|
|
1205
|
-
<p>
|
|
1213
|
+
<p>You won’t find empty buzzwords or vendor lock-in here. This space is <strong>practical, accessible, and real</strong>. Expect content grounded in hands-on consulting experience, addressing real-world needs like:</p>
|
|
1206
1214
|
<ul>
|
|
1207
|
-
<li
|
|
1208
|
-
<li
|
|
1209
|
-
<li
|
|
1210
|
-
<li
|
|
1211
|
-
<li>🎯 <strong>How-to content</strong> to implement secure, open, and ethical technology stacks at scale</li>
|
|
1215
|
+
<li>🔐 <strong>Guides on securing infrastructure</strong> through Zero Trust principles, secure network design, segmentation, and data governance</li>
|
|
1216
|
+
<li>🌐 <strong>Exploration of free and open source tools</strong> that align with professional-grade expectations for security and usability</li>
|
|
1217
|
+
<li>📱 <strong>Best practices for mobile and endpoint hardening</strong>, including private-by-design communications and de-Googled Android stacks</li>
|
|
1218
|
+
<li>⚙️ <strong>Scalable implementation tips</strong> for building resilient, ethical, and vendor-neutral technology environments</li>
|
|
1212
1219
|
</ul>
|
|
1213
|
-
<p>
|
|
1220
|
+
<p>We’ll also publish tutorials, deep dives, and threat-focused analyses to help you <strong>anticipate risk, strengthen defenses, and stay informed</strong>—no jargon, no gatekeeping.</p>
|
|
1214
1221
|
<hr />
|
|
1215
1222
|
<h3 id="our-vision-security-that-respects-you">✅ Our Vision: Security That Respects You</h3>
|
|
1216
|
-
<p>At <strong>Network Pro
|
|
1217
|
-
<p>
|
|
1223
|
+
<p>At <strong>Network Pro™</strong>, we believe security should be <strong>transparent, adaptable, and aligned with your goals</strong>. While we advocate for privacy-first solutions and actively support open technologies, we apply them with discretion—not dogma. Our priority is delivering <strong>reliable, resilient results</strong>, whether through open source tools or vetted proprietary platforms.</p>
|
|
1224
|
+
<p>We serve as trusted advisors for navigating today’s threat landscape—delivering infrastructure consulting, cloud and hybrid architecture support, and technical guidance rooted in industry experience. Our approach is <strong>practical, flexible, and future-focused</strong>, designed to protect what matters most without sacrificing visibility or control.</p>
|
|
1218
1225
|
<hr />
|
|
1219
1226
|
<h3 id="ready-to-build-a-safer-smarter-digital-future">🔐 Ready to Build a Safer, Smarter Digital Future?</h3>
|
|
1220
|
-
<p>Cybersecurity
|
|
1221
|
-
<p
|
|
1222
|
-
<p
|
|
1227
|
+
<p>Cybersecurity isn’t just a product—it’s a process. Whether you're designing secure networks, navigating digital privacy concerns, or evaluating new tools, <strong>Network Pro™</strong> is here to support your mission.</p>
|
|
1228
|
+
<p>Let’s build something secure, sustainable, and respectful of your values.</p>
|
|
1229
|
+
<p>📩 <a href="https://contact.neteng.pro">Contact us</a> today to get started.</p>
|
|
1223
1230
|
<hr />
|
|
1224
1231
|
<div style="font-size: 12px; text-align: center;">
|
|
1225
1232
|
|
|
@@ -1076,15 +1076,22 @@
|
|
|
1076
1076
|
<h2 id="secure-secure-shell"><a class="toclink" href="../../2015/01/04/secure-secure-shell/">Secure Secure Shell</a></h2>
|
|
1077
1077
|
<!-- markdownlint-disable-file -->
|
|
1078
1078
|
|
|
1079
|
-
<
|
|
1080
|
-
|
|
1081
|
-
https://
|
|
1082
|
-
|
|
1083
|
-
|
|
1084
|
-
|
|
1085
|
-
|
|
1086
|
-
|
|
1087
|
-
</
|
|
1079
|
+
<div style="font-size: small; font-style: italic;">
|
|
1080
|
+
|
|
1081
|
+
> **Originally published on 1/4/2015 by [stribika](https://github.com/stribika) at:
|
|
1082
|
+
> [https://blog.stribik.technology/2015/01/04/secure-secure-shell.html](https://blog.stribik.technology/2015/01/04/secure-secure-shell.html)**
|
|
1083
|
+
>
|
|
1084
|
+
> Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:
|
|
1085
|
+
> <https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices>
|
|
1086
|
+
|
|
1087
|
+
</div>
|
|
1088
|
+
|
|
1089
|
+
<div style="font-size: small;">
|
|
1090
|
+
|
|
1091
|
+
> > 📝 **_NOTE:_** Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.
|
|
1092
|
+
|
|
1093
|
+
</div>
|
|
1094
|
+
|
|
1088
1095
|
<ul>
|
|
1089
1096
|
<li><a href="../../2015/01/04/secure-secure-shell/#sshd">Skip to the good part.</a></li>
|
|
1090
1097
|
</ul>
|
|
@@ -1075,15 +1075,16 @@
|
|
|
1075
1075
|
<!-- markdownlint-disable-file -->
|
|
1076
1076
|
|
|
1077
1077
|
<h3 id="welcome-to-the-network-protm-blog-cybersecurity-privacy-open-knowledge"><a class="toclink" href="../../2025/04/30/our-blog-is-live/#welcome-to-the-network-protm-blog-cybersecurity-privacy-open-knowledge">🛡️ Welcome to the Network Pro™ Blog: Cybersecurity. Privacy. Open Knowledge.</a></h3>
|
|
1078
|
-
<p>In
|
|
1079
|
-
<p>Today
|
|
1078
|
+
<p>In a digital world where threats are persistent and privacy is too often an afterthought, <strong>Network Pro Strategies</strong> was founded on a belief that <strong>effective security doesn't require compromise</strong>. We specialize in helping organizations and individuals <strong>navigate today’s cybersecurity challenges with confidence, clarity, and control</strong>.</p>
|
|
1079
|
+
<p>Today marks the launch of our official blog—your go-to destination for <strong>field-tested strategies, implementation insights, and transparent thought leadership</strong> across cybersecurity, network defense, and privacy-aware infrastructure.</p>
|
|
1080
1080
|
<hr />
|
|
1081
1081
|
<h4 id="why-this-blog-exists"><a class="toclink" href="../../2025/04/30/our-blog-is-live/#why-this-blog-exists">📡 Why This Blog Exists</a></h4>
|
|
1082
|
-
<p>
|
|
1082
|
+
<p>Modern security isn’t just about technology—it’s about <strong>trust, autonomy, and informed choices</strong>. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.</p>
|
|
1083
|
+
<p>This blog represents our commitment to providing value through:</p>
|
|
1083
1084
|
<ul>
|
|
1084
|
-
<li>💼 <strong>SMBs and enterprises</strong>
|
|
1085
|
-
<li>🏛️ <strong>Government and
|
|
1086
|
-
<li>👨💻 <strong>
|
|
1085
|
+
<li>💼 <strong>SMBs and enterprises</strong> needing tailored, scalable security that protects business continuity</li>
|
|
1086
|
+
<li>🏛️ <strong>Government and compliance-sensitive sectors</strong> where resilience and data integrity are mission-critical</li>
|
|
1087
|
+
<li>👨💻 <strong>Technologists and privacy-conscious communities</strong> seeking reliable strategies and tools that don’t trade transparency for control</li>
|
|
1087
1088
|
</ul>
|
|
1088
1089
|
|
|
1089
1090
|
|
|
@@ -1076,15 +1076,22 @@
|
|
|
1076
1076
|
<h2 id="secure-secure-shell"><a class="toclink" href="../../2015/01/04/secure-secure-shell/">Secure Secure Shell</a></h2>
|
|
1077
1077
|
<!-- markdownlint-disable-file -->
|
|
1078
1078
|
|
|
1079
|
-
<
|
|
1080
|
-
|
|
1081
|
-
https://
|
|
1082
|
-
|
|
1083
|
-
|
|
1084
|
-
|
|
1085
|
-
|
|
1086
|
-
|
|
1087
|
-
</
|
|
1079
|
+
<div style="font-size: small; font-style: italic;">
|
|
1080
|
+
|
|
1081
|
+
> **Originally published on 1/4/2015 by [stribika](https://github.com/stribika) at:
|
|
1082
|
+
> [https://blog.stribik.technology/2015/01/04/secure-secure-shell.html](https://blog.stribik.technology/2015/01/04/secure-secure-shell.html)**
|
|
1083
|
+
>
|
|
1084
|
+
> Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:
|
|
1085
|
+
> <https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices>
|
|
1086
|
+
|
|
1087
|
+
</div>
|
|
1088
|
+
|
|
1089
|
+
<div style="font-size: small;">
|
|
1090
|
+
|
|
1091
|
+
> > 📝 **_NOTE:_** Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.
|
|
1092
|
+
|
|
1093
|
+
</div>
|
|
1094
|
+
|
|
1088
1095
|
<ul>
|
|
1089
1096
|
<li><a href="../../2015/01/04/secure-secure-shell/#sshd">Skip to the good part.</a></li>
|
|
1090
1097
|
</ul>
|
package/docs/blog/index.html
CHANGED
|
@@ -25,7 +25,7 @@
|
|
|
25
25
|
|
|
26
26
|
|
|
27
27
|
|
|
28
|
-
<title>Blog
|
|
28
|
+
<title>Blog Home - Network Pro Strategies</title>
|
|
29
29
|
|
|
30
30
|
|
|
31
31
|
|
|
@@ -71,7 +71,7 @@
|
|
|
71
71
|
<div data-md-component="skip">
|
|
72
72
|
|
|
73
73
|
|
|
74
|
-
<a href="#
|
|
74
|
+
<a href="#blog-home" class="md-skip">
|
|
75
75
|
Skip to content
|
|
76
76
|
</a>
|
|
77
77
|
|
|
@@ -104,7 +104,7 @@
|
|
|
104
104
|
<div class="md-header__topic" data-md-component="header-topic">
|
|
105
105
|
<span class="md-ellipsis">
|
|
106
106
|
|
|
107
|
-
Blog
|
|
107
|
+
Blog Home
|
|
108
108
|
|
|
109
109
|
</span>
|
|
110
110
|
</div>
|
|
@@ -1024,7 +1024,7 @@
|
|
|
1024
1024
|
<header class="md-typeset">
|
|
1025
1025
|
<p><sup><a href="https://spdx.dev/learn/handling-license-info/">SPDX-License-Identifier</a>:
|
|
1026
1026
|
<code>CC-BY-4.0 OR GPL-3.0-or-later</code></sup></p>
|
|
1027
|
-
<h1 id="
|
|
1027
|
+
<h1 id="blog-home">Blog Home</h1>
|
|
1028
1028
|
<!-- markdownlint-disable-file -->
|
|
1029
1029
|
</header>
|
|
1030
1030
|
|
|
@@ -1064,15 +1064,16 @@
|
|
|
1064
1064
|
<!-- markdownlint-disable-file -->
|
|
1065
1065
|
|
|
1066
1066
|
<h3 id="welcome-to-the-network-protm-blog-cybersecurity-privacy-open-knowledge"><a class="toclink" href="2025/04/30/our-blog-is-live/#welcome-to-the-network-protm-blog-cybersecurity-privacy-open-knowledge">🛡️ Welcome to the Network Pro™ Blog: Cybersecurity. Privacy. Open Knowledge.</a></h3>
|
|
1067
|
-
<p>In
|
|
1068
|
-
<p>Today
|
|
1067
|
+
<p>In a digital world where threats are persistent and privacy is too often an afterthought, <strong>Network Pro Strategies</strong> was founded on a belief that <strong>effective security doesn't require compromise</strong>. We specialize in helping organizations and individuals <strong>navigate today’s cybersecurity challenges with confidence, clarity, and control</strong>.</p>
|
|
1068
|
+
<p>Today marks the launch of our official blog—your go-to destination for <strong>field-tested strategies, implementation insights, and transparent thought leadership</strong> across cybersecurity, network defense, and privacy-aware infrastructure.</p>
|
|
1069
1069
|
<hr />
|
|
1070
1070
|
<h4 id="why-this-blog-exists"><a class="toclink" href="2025/04/30/our-blog-is-live/#why-this-blog-exists">📡 Why This Blog Exists</a></h4>
|
|
1071
|
-
<p>
|
|
1071
|
+
<p>Modern security isn’t just about technology—it’s about <strong>trust, autonomy, and informed choices</strong>. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.</p>
|
|
1072
|
+
<p>This blog represents our commitment to providing value through:</p>
|
|
1072
1073
|
<ul>
|
|
1073
|
-
<li>💼 <strong>SMBs and enterprises</strong>
|
|
1074
|
-
<li>🏛️ <strong>Government and
|
|
1075
|
-
<li>👨💻 <strong>
|
|
1074
|
+
<li>💼 <strong>SMBs and enterprises</strong> needing tailored, scalable security that protects business continuity</li>
|
|
1075
|
+
<li>🏛️ <strong>Government and compliance-sensitive sectors</strong> where resilience and data integrity are mission-critical</li>
|
|
1076
|
+
<li>👨💻 <strong>Technologists and privacy-conscious communities</strong> seeking reliable strategies and tools that don’t trade transparency for control</li>
|
|
1076
1077
|
</ul>
|
|
1077
1078
|
|
|
1078
1079
|
|
|
@@ -1122,15 +1123,22 @@
|
|
|
1122
1123
|
<h2 id="secure-secure-shell"><a class="toclink" href="2015/01/04/secure-secure-shell/">Secure Secure Shell</a></h2>
|
|
1123
1124
|
<!-- markdownlint-disable-file -->
|
|
1124
1125
|
|
|
1125
|
-
<
|
|
1126
|
-
|
|
1127
|
-
https://
|
|
1128
|
-
|
|
1129
|
-
|
|
1130
|
-
|
|
1131
|
-
|
|
1132
|
-
|
|
1133
|
-
</
|
|
1126
|
+
<div style="font-size: small; font-style: italic;">
|
|
1127
|
+
|
|
1128
|
+
> **Originally published on 1/4/2015 by [stribika](https://github.com/stribika) at:
|
|
1129
|
+
> [https://blog.stribik.technology/2015/01/04/secure-secure-shell.html](https://blog.stribik.technology/2015/01/04/secure-secure-shell.html)**
|
|
1130
|
+
>
|
|
1131
|
+
> Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see:
|
|
1132
|
+
> <https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices>
|
|
1133
|
+
|
|
1134
|
+
</div>
|
|
1135
|
+
|
|
1136
|
+
<div style="font-size: small;">
|
|
1137
|
+
|
|
1138
|
+
> > 📝 **_NOTE:_** Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.
|
|
1139
|
+
|
|
1140
|
+
</div>
|
|
1141
|
+
|
|
1134
1142
|
<ul>
|
|
1135
1143
|
<li><a href="2015/01/04/secure-secure-shell/#sshd">Skip to the good part.</a></li>
|
|
1136
1144
|
</ul>
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version": "https://jsonfeed.org/version/1", "title": "Network Pro Strategies", "home_page_url": "https://netwk.pro/docs/", "feed_url": "https://netwk.pro/docs/feed_json_created.json", "description": null, "icon": null, "authors": [], "language": "en", "items": [{"id": "https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/", "url": "https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/", "title": "Our Blog is Live!", "content_html": "<p><sup><a href=\"https://spdx.dev/learn/handling-license-info/\">SPDX-License-Identifier</a>:\n<code>CC-BY-4.0 OR GPL-3.0-or-later</code></sup></p>\n<h1>We're Live!</h1>\n<!-- markdownlint-disable-file -->\n\n<h2>\ud83d\udee1\ufe0f Welcome to the Network Pro™ Blog: Cybersecurity. Privacy. Open Knowledge.</h2>\n<p>In
|
|
1
|
+
{"version": "https://jsonfeed.org/version/1", "title": "Network Pro Strategies", "home_page_url": "https://netwk.pro/docs/", "feed_url": "https://netwk.pro/docs/feed_json_created.json", "description": null, "icon": null, "authors": [], "language": "en", "items": [{"id": "https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/", "url": "https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/", "title": "Our Blog is Live!", "content_html": "<p><sup><a href=\"https://spdx.dev/learn/handling-license-info/\">SPDX-License-Identifier</a>:\n<code>CC-BY-4.0 OR GPL-3.0-or-later</code></sup></p>\n<h1>We're Live!</h1>\n<!-- markdownlint-disable-file -->\n\n<h2>\ud83d\udee1\ufe0f Welcome to the Network Pro™ Blog: Cybersecurity. Privacy. Open Knowledge.</h2>\n<p>In a digital world where threats are persistent and privacy is too often an afterthought, <strong>Network Pro Strategies</strong> was founded on a belief that <strong>effective security doesn't require compromise</strong>. We specialize in helping organizations and individuals <strong>navigate today\u2019s cybersecurity challenges with confidence, clarity, and control</strong>.</p>\n<p>Today marks the launch of our official blog\u2014your go-to destination for <strong>field-tested strategies, implementation insights, and transparent thought leadership</strong> across cybersecurity, network defense, and privacy-aware infrastructure.</p>\n<hr>\n<h3>\ud83d\udce1 Why This Blog Exists</h3>\n<p>Modern security isn\u2019t just about technology\u2014it\u2019s about <strong>trust, autonomy, and informed choices</strong>. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.</p>\n<p>This blog represents our commitment to providing value through:</p>\n<ul>\n<li>\ud83d\udcbc <strong>SMBs and enterprises</strong> needing tailored, scalable security that protects business continuity</li>\n<li>\ud83c\udfdb\ufe0f <strong>Government and compliance-sensitive sectors</strong> where resilience and data integrity are mission-critical</li>\n<li>\ud83d\udc68\u200d\ud83d\udcbb <strong>Technologists and privacy-conscious communities</strong> seeking reliable strategies and tools that don\u2019t trade transparency for control</li>\n</ul>", "image": null, "date_published": "2025-04-30T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}, {"id": "https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/", "url": "https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/", "title": "Secure Secure Shell", "content_html": "<h1>Secure Secure Shell</h1>\n<!-- markdownlint-disable-file -->\n\n<div style=\"font-size: small; font-style: italic;\">\n\n> **Originally published on 1/4/2015 by [stribika](https://github.com/stribika) at: \n> [https://blog.stribik.technology/2015/01/04/secure-secure-shell.html](https://blog.stribik.technology/2015/01/04/secure-secure-shell.html)**\n>\n> Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see: \n> <https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices>\n\n</div>\n\n<div style=\"font-size: small;\">\n\n> > \ud83d\udcdd **_NOTE:_** Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.\n\n</div>\n\n<ul>\n<li><a href=\"#sshd\">Skip to the good part.</a></li>\n</ul>\n<p>You may have heard that the NSA can decrypt SSH at least some of the time.\nIf you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.</p>\n<p>TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.</p>", "image": null, "date_published": "2015-01-04T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}]}
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version": "https://jsonfeed.org/version/1", "title": "Network Pro Strategies", "home_page_url": "https://netwk.pro/docs/", "feed_url": "https://netwk.pro/docs/feed_json_updated.json", "description": null, "icon": null, "authors": [], "language": "en", "items": [{"id": "https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/", "url": "https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/", "title": "Our Blog is Live!", "content_html": "<p><sup><a href=\"https://spdx.dev/learn/handling-license-info/\">SPDX-License-Identifier</a>:\n<code>CC-BY-4.0 OR GPL-3.0-or-later</code></sup></p>\n<h1>We're Live!</h1>\n<!-- markdownlint-disable-file -->\n\n<h2>\ud83d\udee1\ufe0f Welcome to the Network Pro™ Blog: Cybersecurity. Privacy. Open Knowledge.</h2>\n<p>In
|
|
1
|
+
{"version": "https://jsonfeed.org/version/1", "title": "Network Pro Strategies", "home_page_url": "https://netwk.pro/docs/", "feed_url": "https://netwk.pro/docs/feed_json_updated.json", "description": null, "icon": null, "authors": [], "language": "en", "items": [{"id": "https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/", "url": "https://netwk.pro/docs/blog/2025/04/30/our-blog-is-live/", "title": "Our Blog is Live!", "content_html": "<p><sup><a href=\"https://spdx.dev/learn/handling-license-info/\">SPDX-License-Identifier</a>:\n<code>CC-BY-4.0 OR GPL-3.0-or-later</code></sup></p>\n<h1>We're Live!</h1>\n<!-- markdownlint-disable-file -->\n\n<h2>\ud83d\udee1\ufe0f Welcome to the Network Pro™ Blog: Cybersecurity. Privacy. Open Knowledge.</h2>\n<p>In a digital world where threats are persistent and privacy is too often an afterthought, <strong>Network Pro Strategies</strong> was founded on a belief that <strong>effective security doesn't require compromise</strong>. We specialize in helping organizations and individuals <strong>navigate today\u2019s cybersecurity challenges with confidence, clarity, and control</strong>.</p>\n<p>Today marks the launch of our official blog\u2014your go-to destination for <strong>field-tested strategies, implementation insights, and transparent thought leadership</strong> across cybersecurity, network defense, and privacy-aware infrastructure.</p>\n<hr>\n<h3>\ud83d\udce1 Why This Blog Exists</h3>\n<p>Modern security isn\u2019t just about technology\u2014it\u2019s about <strong>trust, autonomy, and informed choices</strong>. As threats evolve and surveillance becomes normalized, we believe clients deserve more than marketing fluff and opaque solutions.</p>\n<p>This blog represents our commitment to providing value through:</p>\n<ul>\n<li>\ud83d\udcbc <strong>SMBs and enterprises</strong> needing tailored, scalable security that protects business continuity</li>\n<li>\ud83c\udfdb\ufe0f <strong>Government and compliance-sensitive sectors</strong> where resilience and data integrity are mission-critical</li>\n<li>\ud83d\udc68\u200d\ud83d\udcbb <strong>Technologists and privacy-conscious communities</strong> seeking reliable strategies and tools that don\u2019t trade transparency for control</li>\n</ul>", "image": null, "date_modified": "2025-05-05T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}, {"id": "https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/", "url": "https://netwk.pro/docs/blog/2015/01/04/secure-secure-shell/", "title": "Secure Secure Shell", "content_html": "<h1>Secure Secure Shell</h1>\n<!-- markdownlint-disable-file -->\n\n<div style=\"font-size: small; font-style: italic;\">\n\n> **Originally published on 1/4/2015 by [stribika](https://github.com/stribika) at: \n> [https://blog.stribik.technology/2015/01/04/secure-secure-shell.html](https://blog.stribik.technology/2015/01/04/secure-secure-shell.html)**\n>\n> Mirrored to preserve information. Minor changes have been made, and this is noted where applicable. Also see: \n> <https://security.stackexchange.com/questions/143442/what-are-ssh-keygen-best-practices>\n\n</div>\n\n<div style=\"font-size: small;\">\n\n> > \ud83d\udcdd **_NOTE:_** Despite this article's age, we've yet to come across a better source of information with regard to SSH configuration.\n\n</div>\n\n<ul>\n<li><a href=\"#sshd\">Skip to the good part.</a></li>\n</ul>\n<p>You may have heard that the NSA can decrypt SSH at least some of the time.\nIf you have not, then read the [latest batch of Snowden documents][snowden-docs] now. All of it. This post will still be here when you finish. My goal with this post here is to make NSA analysts sad.</p>\n<p>TL;DR: Scan this post for fixed width fonts, these will be the config file snippets and commands you have to use.</p>", "image": null, "date_modified": "2025-05-04T00:00:00+00:00", "authors": [{"name": "Network Pro"}], "tags": null}]}
|