frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Tell HN: Another round of Zendesk email spam

97•Philpax•16h ago•47 comments

Ask HN: Is Connecting via SSH Risky?

11•atrevbot•8h ago•18 comments

Ask HN: Who wants to be hired? (February 2026)

136•whoishiring•2d ago•441 comments

Ask HN: Has your whole engineering team gone big into AI coding? How's it going?

3•jchung•6h ago•1 comments

Ask HN: Who is hiring? (February 2026)

305•whoishiring•2d ago•465 comments

We built a serverless GPU inference platform with predictable latency

3•QubridAI•6h ago•1 comments

Ask HN: Mem0 stores memories, but doesn't learn user patterns

8•fliellerjulian•15h ago•6 comments

Ask HN: Where does operational truth live before it reaches "systems of record"?

2•former-aws•13h ago•3 comments

Ask HN: Do you still use physical calculators?

58•speedylight•5d ago•124 comments

Ask HN: Is there anyone here who still uses slide rules?

120•blenderob•1d ago•121 comments

YC S26 Application: "Attach a coding agent session you're particularly proud of"

4•simplydt•18h ago•1 comments

Google Cloud suspended my account for 2 years, only automated replies

159•andylizf•4d ago•99 comments

Kernighan on Programming

166•chrisjj•2d ago•59 comments

Ask HN: When will LLMs generate professional-level CAD models?

8•dsrtslnd23•18h ago•5 comments

Ask HN: Does anyone have interests in anything besides AI?

8•drsalt•9h ago•7 comments

Ask HN: Are ISPs "evil" and who runs the Internet?

5•tavro•22h ago•2 comments

How do you manage context/memory across multiple AI tools?

7•arapkuliev•22h ago•5 comments

Ask HN: Cheap laptop for Linux without GUI (for writing)

11•locusofself•1d ago•15 comments

Ask HN: OpenClaw users, what is your token spend?

14•8cvor6j844qw_d6•2d ago•6 comments

Ask HN: Have you been fired because of AI?

15•s-stude•2d ago•15 comments

Ask HN: Anyone have a "sovereign" solution for phone calls?

9•kldg•1d ago•1 comments

GitHub Actions Have "Major Outage"

52•graton•2d ago•17 comments

Ask HN: Has anybody moved their local community off of Facebook groups?

21•madsohm•3d ago•15 comments

Ask HN: What weird or scrappy things did you do to get your first users?

13•preston-kwei•2d ago•8 comments

Ask HN: Tech Debt War Stories

6•erubini_fg•1d ago•8 comments

Ask HN: Does a good "read it later" app exist?

5•buchanae•1d ago•16 comments

Ask HN: Are you still using spec driven development?

6•cherry_tree•2d ago•5 comments

My small SaaS got recommended my Google in the AI search overview

4•kaave•2d ago•3 comments

Signal Is Down

40•Daniel_sk•1d ago•10 comments

Why do people still talk about AGI?

42•cermicelli•3d ago•64 comments
Open in hackernews

Ask HN: Is Connecting via SSH Risky?

11•atrevbot•8h ago
I have been managing websites for a while and usually utilize SSH connections to login to, deploy code to, and otherwise remotely access the hosting servers.

I was recently informed that a client I work with considers that a legal risk.

If the SSH connection is set to disallow passwords and only authorize via SSH keys, how big of a risk is this?

Comments

phren0logy•8h ago
Compared to what?
DamonHD•8h ago
Indeed.
atrevbot•8h ago
They seem to be okay w/ only HTTP ports being open on the server (80, 443). They "found that open ports can lead to cyber claims".
bediger4000•7h ago
That's like saying that open bottles lead to alcoholism.
wolvoleo•5h ago
"Cyber claims" sounds like someone who doesn't have a clue what they are talking about.

But yeah putting it behind some kind of VPN is advisable if anything because of all the driveby nuisance attacks on ipv4.

robertcope•7h ago
How else would you do it?
muppetman•5h ago
Wireguard and Telnet ;)
rl3•7h ago
Best practices usually call for not exposing the SSH endpoints to the public internet. The principal risk is vulnerabilities in the underlying SSH server implementation. Historically, critical flaws that can compromise you are few and far between. However, these days AI is already starting to become adept at reverse engineering.

If you must, you'd typically use a bastion host that's configured just for the purpose of handing inbound SSH connections, and is locked down to a maximal degree. It then routes SSH traffic to your other machines internally.

I'd argue that model is outdated though, and the prevailing preference is putting SSH behind the firewall on internal networks. Think Wireguard, Tailscale, service meshes, and so on.

With AWS, restricting SSH ports via security groups to just your IP is simple and goes a long way.

Msurrow•4h ago
But doesn’t your argument that the principal risk [with ssh] is vulnerabilities also apply to the alternatives you say is best practice? Firewalling off ssh (but not http(s)) has the risk of vulns in the FW software. Tailscale, wireguard etc also has the risk of vulns in that software?

So what’s the difference in risk of ssh software vulns and other software vulns?

Also, another point of view is that vulnerabilities are not very high on the risk ladder. Weak passwords, password reuse etc are far greater risks. So, the alternatives to ssh you suggest are all reliant on passwords but ssh, in the case, is based on secure keys and no passwords. Should “best practices” not include this perpective?

rl3•4h ago
Good defense is layered.

For vulnerabilities, complexity usually equals surface area. WireGuard was created with simplicity in mind.

>So, the alternatives to ssh you suggest are all reliant on passwords but ssh, in the case, is based on secure keys and no passwords.

WireGuard is key-based. I highly suggest reading its whitepaper:

https://www.wireguard.com/papers/wireguard.pdf

verdverm•7h ago
Runs counter to my understanding, I'd ask for clarification and find support material to show your approach is safer.

Treat it as a teaching moment for them

speleolinux•7h ago
If your private key has a good passphrase and is suitably encrypted, say with ed25519, then that's probably as good as you can do other than physically going into work and storing everything in your head :-) Politely ask the client to suggest what they consider would be a suitable alternative. I also setup git hooks to prevent accidentally checking in private keys or passwords into git or other version control systems. And if I'm travelling into or from work I also encrypt some stuff just in case I have a problem and the laptop is stolen.
tim-tday•6h ago
They probably mean leaving ssh open to all ips. Take a look at your auth failure logs to see the thousands of daily attempts to compromise your server using default passwords. Most of those are low effort and low risk. Sometimes the bots will try password stuffing. Disabling password auth in sshd config is good practice. Fail2ban also helps block repeated attempts like that.

There’s also the risk of a zero day RCE vulnerability in ssh (though I’ve not seen one in the 20 years I’ve been paying attention )

I tend to not expose ssh to the world and log in with some other method to pass the perimeter (VPN, IP whitelist, tailscale) and the ssh from inside.

xhanah•6h ago
ditto to everything here. If you really want to you can also change the port to something random to avoid bot spam. but you shouldn't have SSH accessible directly from the internet anyway.

If you are using only keys, make sure they are managed, tracked, securely stored and backed up. The last thing you want is to have a machine die that has the only private key for your environment.

bigstrat2003•5h ago
SSH is not at all risky if you disable password authentication. There's essentially zero chance that someone guesses your private key, though you might get annoyed with all the login failures spamming your logs. Fail2ban helps with that if you care, though I don't personally bother these days.
_Chief•2h ago
> If the SSH connection is set to disallow passwords and only authorize via SSH keys, how big of a risk is this

low risk, do this. Keys (ed25519,4096 rsa) are impractical to brute force. However I'd also recommend:

- use a different port than 22 (add your .ssh/config for easier UX if needed) - port 22 can get incredibly noisy with tons of bots probing

- disable passwordAuth, disable PermitRootLogin - use a normal user with sudo for your ssh

- consider a vpn please - I use tailscale, but I hear headscale is good - then use UFW to only allow SSH from the tailscale network (I generally allow all network on tailscale). Tailscale wrote a guide on this here [1]

- do not add and forget authorized_keys from machines you arent using

- I'm especially worried about how people keep giving Clawdbot/Openclaw access to all their machines, key auth means the machine is authorized on your server

- For new servers I often just add all my public keys to them (github lists all your keys at github.com/GH_USERNAME.keys

1: https://tailscale.com/docs/how-to/secure-ubuntu-server-with-...

janmalec•1h ago
Many people keep offering advice to consider a VPN and while VPN is very usefull, I have not yet come accross a reason why not use ssh auth. Like what can actually happen? From my pov the risk of running all sorts of userspace software with internet access is much greater, even without port forwarding.
kasey_junk•1h ago
You said “legal” risk, not “security” risk. You’ll need to get more information on what risks they are trying to mitigate and talk to a “legal” expert rather than engaging on a technical or security basis.