Dear forum users! I need your help!
Understanding SSH (2) technology, there are a few questions:
- What are the actual amendments in the client and server settings for 2017?
(For example, I heard that md5 is not safe already, maybe there is something else and I do not know)
- What to watch and learn logs ?
(I would like to, of course, with the backlight and in real time , well, with the GUI, although it will also go without it. Something with a minimum of dependencies)
- How to force logs to write in a separate log , but not in the system?
(So ​​that all logs related to SSH are in a different directory, at least temporarily, to learn the technology)
- What to look for when analyzing a log?
(What are the signs of intrusion attempts besides many password entry attempts)
- How to break through this scheme:
Host1 == Router (NAT0) == Provider-NAT1 == Internet == Provider-NAT2 == Host2 What advice do you have in this situation?
- What server and client will you advise?
(I have already made a choice, but suddenly surprise :))
As a matter of fact, I primarily need file operations from SSH (I mounted it and you move / copy / delete files and directories in the file manager)