<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://aznot.com/index.php?action=history&amp;feed=atom&amp;title=Linux%2Fsshd</id>
	<title>Linux/sshd - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://aznot.com/index.php?action=history&amp;feed=atom&amp;title=Linux%2Fsshd"/>
	<link rel="alternate" type="text/html" href="https://aznot.com/index.php?title=Linux/sshd&amp;action=history"/>
	<updated>2026-04-30T13:38:22Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.41.0</generator>
	<entry>
		<id>https://aznot.com/index.php?title=Linux/sshd&amp;diff=8222&amp;oldid=prev</id>
		<title>Kenneth: /* Allow Reverse Tunnel */</title>
		<link rel="alternate" type="text/html" href="https://aznot.com/index.php?title=Linux/sshd&amp;diff=8222&amp;oldid=prev"/>
		<updated>2024-12-23T22:12:26Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Allow Reverse Tunnel&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 22:12, 23 December 2024&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l21&quot;&gt;Line 21:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 21:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;/etc/ssh/sshd_config:&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;/etc/ssh/sshd_config:&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  Match User oli&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt; # Allow reverse tunnel&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt; # Ref: https://askubuntu.com/questions/50064/reverse-port-tunnelling&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-side-deleted&quot;&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  Match User oli&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;,kpx&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;    GatewayPorts yes&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;    GatewayPorts yes&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;

&lt;!-- diff cache key aznot:diff:1.41:old-5845:rev-8222:php=table --&gt;
&lt;/table&gt;</summary>
		<author><name>Kenneth</name></author>
	</entry>
	<entry>
		<id>https://aznot.com/index.php?title=Linux/sshd&amp;diff=5845&amp;oldid=prev</id>
		<title>Kenneth: /* Secure Linux */</title>
		<link rel="alternate" type="text/html" href="https://aznot.com/index.php?title=Linux/sshd&amp;diff=5845&amp;oldid=prev"/>
		<updated>2021-02-16T16:01:45Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Secure Linux&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== sshd ==&lt;br /&gt;
&lt;br /&gt;
SSH Daemon&lt;br /&gt;
&lt;br /&gt;
== Configuration Options ==&lt;br /&gt;
&lt;br /&gt;
More information:&lt;br /&gt;
 man sshd_config&lt;br /&gt;
&lt;br /&gt;
== Allow Tunneling ==&lt;br /&gt;
&lt;br /&gt;
Allow Tunneling (/etc/ssh/sshd_config):&lt;br /&gt;
 AllowTcpForwarding yes&lt;br /&gt;
&lt;br /&gt;
== Allow Reverse Tunnel ==&lt;br /&gt;
&lt;br /&gt;
Reverse:&lt;br /&gt;
 ssh -R 8000:localhost:80 oli@remote-machine&lt;br /&gt;
&lt;br /&gt;
Allow this with:&lt;br /&gt;
&lt;br /&gt;
/etc/ssh/sshd_config:&lt;br /&gt;
 Match User oli&lt;br /&gt;
   GatewayPorts yes&lt;br /&gt;
&lt;br /&gt;
ref: https://askubuntu.com/questions/50064/reverse-port-tunnelling&lt;br /&gt;
&lt;br /&gt;
keywords reverse tunnel reverse proxy&lt;br /&gt;
&lt;br /&gt;
== SFTP ==&lt;br /&gt;
&lt;br /&gt;
To provide SFTP access to linux accounts only (no shell access) change user&amp;#039;s shell to:&lt;br /&gt;
 /usr/libexec/openssh/sftp-server&lt;br /&gt;
 test:x:501:50::/ftp:/usr/libexec/openssh/sftp-server&lt;br /&gt;
&lt;br /&gt;
See [[vsftpd]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
/etc/ssh/sshd_config:&lt;br /&gt;
 # override default of no subsystems&lt;br /&gt;
 Subsystem       sftp    /usr/libexec/openssh/sftp-server&lt;br /&gt;
&lt;br /&gt;
== chroot ==&lt;br /&gt;
&lt;br /&gt;
/etc/ssh/sshd_config&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#Subsystem      sftp    /usr/libexec/openssh/sftp-server&lt;br /&gt;
Subsystem sftp internal-sftp&lt;br /&gt;
&lt;br /&gt;
Match User ezra&lt;br /&gt;
        ChrootDirectory /home/%u&lt;br /&gt;
        #ForceCommand internal-sftp&lt;br /&gt;
        AllowTcpForwarding no&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If you want to use &amp;#039;sftp-server&amp;#039; in the chroot, you have to copy it and add the appropriate libraries, but why bother when internal-sftp works just fine.&lt;br /&gt;
&lt;br /&gt;
Setup chroot home directory:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
NEWUSER=ezra&lt;br /&gt;
adduser $NEWUSER&lt;br /&gt;
&lt;br /&gt;
chown root:root /home/$NEWUSER&lt;br /&gt;
chmod 755 /home/$NEWUSER&lt;br /&gt;
&lt;br /&gt;
cd /home/$NEWUSER&lt;br /&gt;
&lt;br /&gt;
mkdir home/$NEWUSER&lt;br /&gt;
mv .bash* home/$NEWUSER/&lt;br /&gt;
&lt;br /&gt;
# ssh keys&lt;br /&gt;
mkdir -p home/$NEWUSER/.ssh&lt;br /&gt;
chown $NEWUSER:$NEWUSER home/$NEWUSER&lt;br /&gt;
touch home/$NEWUSER/.ssh/authorized_keys&lt;br /&gt;
chmod 600 home/$NEWUSER/.ssh/authorized_keys&lt;br /&gt;
chmod 700 home/$NEWUSER/.ssh&lt;br /&gt;
chmod 755 home/$NEWUSER&lt;br /&gt;
ln -s home/$NEWUSER/.ssh .ssh  # sshd still tries to access the real /home/user/.ssh path&lt;br /&gt;
&lt;br /&gt;
# libs for shell apps and ssh access&lt;br /&gt;
mkdir {bin,dev,dev/pts,lib64,home,home/$NEWUSER}&lt;br /&gt;
cp -p /bin/{bash,cat,cp,ls,mv} bin/&lt;br /&gt;
cp -p /lib64/{ld-linux-x86-64.so.2,libacl.so.1,libattr.so.1,libcap.so.2,libc.so.6,libdl.so.2,libpthread.so.0,librt.so.1,libselinux.so.1,libtinfo.so.5} lib64/&lt;br /&gt;
mknod dev/null c 1 3&lt;br /&gt;
mknod dev/zero c 1 5&lt;br /&gt;
chmod 0666 dev/{null,zero}&lt;br /&gt;
mknod -m 666 dev/tty c 5 0&lt;br /&gt;
mknod -m 666 dev/ptmx c 5 2&lt;br /&gt;
chmod 755 dev/pts&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
find missing libraries (eg. ldd /bin/bash)&lt;br /&gt;
&lt;br /&gt;
=== chroot sftp only ===&lt;br /&gt;
&lt;br /&gt;
/etc/ssh/sshd_config&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#Subsystem      sftp    /usr/libexec/openssh/sftp-server&lt;br /&gt;
Subsystem sftp internal-sftp&lt;br /&gt;
&lt;br /&gt;
Match User ezra&lt;br /&gt;
        ChrootDirectory /home/%u&lt;br /&gt;
        ForceCommand internal-sftp&lt;br /&gt;
        AllowTcpForwarding no&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
/etc/passwd:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
ezra:x:507:507::/home/ezra:/bin/false&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Setup chroot home directory:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
NEWUSER=ezra&lt;br /&gt;
adduser $NEWUSER&lt;br /&gt;
cd /home/$NEWUSER&lt;br /&gt;
&lt;br /&gt;
chown root:root /home/$NEWUSER&lt;br /&gt;
chmod 755 /home/$NEWUSER&lt;br /&gt;
&lt;br /&gt;
mkdir -p home/$NEWUSER&lt;br /&gt;
chown $NEWUSER:$NEWUSER home/$NEWUSER&lt;br /&gt;
mv .bash* home/$NEWUSER/&lt;br /&gt;
&lt;br /&gt;
# ssh keys&lt;br /&gt;
mkdir home/$NEWUSER/.ssh&lt;br /&gt;
touch home/$NEWUSER/.ssh/authorized_keys&lt;br /&gt;
chmod 600 home/$NEWUSER/.ssh/authorized_keys&lt;br /&gt;
chmod 700 home/$NEWUSER/.ssh&lt;br /&gt;
chmod 755 home/$NEWUSER&lt;br /&gt;
chown $NEWUSER:$NEWUSER home/$NEWUSER/.ssh -R&lt;br /&gt;
ln -s home/$NEWUSER/.ssh .ssh  # sshd still tries to access the real /home/user/.ssh path&lt;br /&gt;
&lt;br /&gt;
# pub directory&lt;br /&gt;
mkdir pub&lt;br /&gt;
chmod 775 pub&lt;br /&gt;
chown $NEWUSER:$NEWUSER pub&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Allow and Deny Users ==&lt;br /&gt;
&lt;br /&gt;
/etc/ssh/sshd_config:&lt;br /&gt;
&lt;br /&gt;
 DenyUsers user1 user2 user3&lt;br /&gt;
 DenyGroups group1 group2&lt;br /&gt;
 AllowUsers user1 user2&lt;br /&gt;
 AllowGroups group1 group2&lt;br /&gt;
&lt;br /&gt;
== no reverse dns lookup ==&lt;br /&gt;
&lt;br /&gt;
If you are having delays due to DNS lookups, these can be disabled:&lt;br /&gt;
&lt;br /&gt;
/etc/ssh/sshd_config:&lt;br /&gt;
 #UseDNS yes&lt;br /&gt;
 UseDNS no&lt;br /&gt;
&lt;br /&gt;
man sshd_config:&lt;br /&gt;
 UseDNS  Specifies whether sshd should look up the remote host name and check that the resolved host name for the remote IP&lt;br /&gt;
             address maps back to the very same IP address.  The default is “yes”.&lt;br /&gt;
&lt;br /&gt;
== Banner ==&lt;br /&gt;
&lt;br /&gt;
/etc/ssh/sshd_config:&lt;br /&gt;
 Banner /etc/sshd/sshd-banner&lt;br /&gt;
&lt;br /&gt;
sample /etc/sshd/sshd-banner:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
*****************************************************************************&lt;br /&gt;
&lt;br /&gt;
                              NOTICE TO USERS&lt;br /&gt;
&lt;br /&gt;
      WARNING! The use of this system is restricted to authorized users,&lt;br /&gt;
        unauthorized access is forbidden and will be prosecuted by law.&lt;br /&gt;
&lt;br /&gt;
         All information and communications on this system are subject&lt;br /&gt;
               to review, monitoring and recording at any time,&lt;br /&gt;
             without notice or permission. Users should have no&lt;br /&gt;
                            expectation of privacy.&lt;br /&gt;
&lt;br /&gt;
*****************************************************************************&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* How to force sshd server to display login banner before login (change the ssh server login banner) - http://www.cyberciti.biz/tips/change-openssh-sshd-server-login-banner.html&lt;br /&gt;
* Login Banner | SSH Banner Howto - http://www.review-ninja.com/2009/05/login-banner-ssh-banner-howto.html&lt;br /&gt;
&lt;br /&gt;
== Allow Public Key Authentication ==&lt;br /&gt;
&lt;br /&gt;
/etc/ssh/sshd_config:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# enable public-key authentication&lt;br /&gt;
RSAAuthentication no&lt;br /&gt;
PubkeyAuthentication yes&lt;br /&gt;
AuthorizedKeysFile     .ssh/authorized_keys&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Fancy key location:&lt;br /&gt;
 AuthorizedKeysFile /etc/ssh/keys-%u/authorized_keys&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Additional Details:&lt;br /&gt;
&lt;br /&gt;
Configuring OpenSSH to accept public-key authentication - http://linux-sxs.org/networking/openssh.putty.html&lt;br /&gt;
&lt;br /&gt;
To enable your OpenSSH to accept version 2 public key, you would need to modify /etc/ssh/sshd_config. You could use vi editor (or whatever editor you are familiar with) to uncomment/add/modify the following lines to /etc/ssh/sshd_config:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
# the default SSH port is 22, you could alter it if necessary&lt;br /&gt;
Port 22&lt;br /&gt;
&lt;br /&gt;
# accept version 2 keys only&lt;br /&gt;
Protocol 2&lt;br /&gt;
&lt;br /&gt;
# NEVER allow root to login directly over the net&lt;br /&gt;
PermitRootLogin no&lt;br /&gt;
StrictModes yes&lt;br /&gt;
MaxAuthTries 3&lt;br /&gt;
&lt;br /&gt;
# enable public-key authentication&lt;br /&gt;
RSAAuthentication no&lt;br /&gt;
PubkeyAuthentication yes&lt;br /&gt;
&lt;br /&gt;
# securing your OpenSSH&lt;br /&gt;
# do not use host-based authentication for security reason&lt;br /&gt;
RhostsRSAAuthentication no&lt;br /&gt;
HostbasedAuthentication no&lt;br /&gt;
IgnoreUserKnownHosts yes&lt;br /&gt;
PermitEmptyPassword no&lt;br /&gt;
&lt;br /&gt;
# do not allow telnet-type login for security reason&lt;br /&gt;
ChallengeResponseAuthentication no&lt;br /&gt;
PasswordAuthentication no&lt;br /&gt;
&lt;br /&gt;
X11Forwarding yes&lt;br /&gt;
X11DisplayOffset 10&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Setup SSHD ==&lt;br /&gt;
&lt;br /&gt;
 mkdir -p /etc/ssh&lt;br /&gt;
 touch /etc/ssh/sshd_config&lt;br /&gt;
&lt;br /&gt;
 # you only have to have one of these to start sshd, but might as well have all&lt;br /&gt;
 ssh-keygen -t rsa1 -f /etc/ssh/ssh_host_key     # rsa v1&lt;br /&gt;
 ssh-keygen -t rsa -f /etc/ssh/ssh_host_rsa_key  # rsa v2 default&lt;br /&gt;
 ssh-keygen -t dsa -f /etc/ssh/ssh_host_dsa_key  # dsa v2&lt;br /&gt;
&lt;br /&gt;
 /sbin/sshd&lt;br /&gt;
&lt;br /&gt;
== Secure Linux ==&lt;br /&gt;
&lt;br /&gt;
If you have copied keys using ssh-copy-id, you may need to fix the Secure Linux permissions:&lt;br /&gt;
 restorecon -r -v ~/.ssh&lt;br /&gt;
&lt;br /&gt;
== Regenerate Host Keys ==&lt;br /&gt;
&lt;br /&gt;
If you try to connect, but it immediately returns without error, your host keys might be corrupted.  Syslog:&lt;br /&gt;
 sshd[2697]: Error loading host key &amp;quot;/etc/ssh/ssh_host_rsa_key&amp;quot;: invalid format&lt;br /&gt;
 sshd[2697]: Error loading host key &amp;quot;/etc/ssh/ssh_host_rsa_key&amp;quot;: invalid format&lt;br /&gt;
 sshd[2697]: Could not load host key: /etc/ssh/ssh_host_rsa_key&lt;br /&gt;
&lt;br /&gt;
To regenerate your host keys:&lt;br /&gt;
 ssh-keygen -A&lt;br /&gt;
&lt;br /&gt;
== keywords ==&lt;br /&gt;
&lt;br /&gt;
ssh sshd secure shell&lt;br /&gt;
&lt;br /&gt;
[[Category:Linux]]&lt;/div&gt;</summary>
		<author><name>Kenneth</name></author>
	</entry>
</feed>