scp uses sftp protocol by default since v8.8. You'll need to pass `-O` parameter to explicitly use the legacy scp protocol if you still need it for backward compatibility reason.
I like how this guide also takes Windows into account, it has some unique challenges.
I have written some notes especially on SSHFS (also for Windows!) and tunnels with SSH (e.g. SOCKS proxy) as an OrgPage: https://www.orgpad.com/s/wRIx3rNLZ6y
These tricks saved my bacon so many times already. Most of it can be used with the FUDO PAM jump host appliance (https://fudosecurity.com/fudo-pam/) that is based on FreeBSD and one of the developers spoke about it and other things on https://www.bsdnow.tv/ I think. Some of it works with OpenWRT's Dropbear nicely as well.
This is a nifty trick, but I recently had an issue where it would offer my other keys even with IdentitiesOnly yes specified in ~/.ssh/config. I found a solution [1], but it's not the most elegant.
The most annoying "feature" of ssh for me is the discrepancy between public keys presentations. How I suppose to verify fingerprint of a new server if it uses a different presentation in the keys file?
[+] [-] thedougd|3 years ago|reply
[+] [-] rollulus|3 years ago|reply
[+] [-] LeoPanthera|3 years ago|reply
[+] [-] thedougd|3 years ago|reply
[+] [-] danuker|3 years ago|reply
https://mosh.org/
[+] [-] marcobehler|3 years ago|reply
[+] [-] acatton|3 years ago|reply
[1] https://lwn.net/Articles/835962/
[2] https://man.openbsd.org/sftp.1
[+] [-] neurostimulant|3 years ago|reply
[+] [-] dhsysusbsjsi|3 years ago|reply
"[sftp] disadvantage is a much less friendly user experience, especially in cases where one simply wants to type a command and see files move."
I just want to copy a file. I'll keep using scp.
[+] [-] LanternLight83|3 years ago|reply
[+] [-] thefilmore|3 years ago|reply
[+] [-] marcobehler|3 years ago|reply
[+] [-] peppermint_tea|3 years ago|reply
[+] [-] tommica|3 years ago|reply
[+] [-] kaliszad|3 years ago|reply
I have written some notes especially on SSHFS (also for Windows!) and tunnels with SSH (e.g. SOCKS proxy) as an OrgPage: https://www.orgpad.com/s/wRIx3rNLZ6y These tricks saved my bacon so many times already. Most of it can be used with the FUDO PAM jump host appliance (https://fudosecurity.com/fudo-pam/) that is based on FreeBSD and one of the developers spoke about it and other things on https://www.bsdnow.tv/ I think. Some of it works with OpenWRT's Dropbear nicely as well.
[+] [-] qwertox|3 years ago|reply
[+] [-] Daviey|3 years ago|reply
``` Host github-work.com .. Host github-personal.com ```
Getting in the habit of using a fake FQDN (which right now aren't registered) feels pretty risky.
[+] [-] cameronperot|3 years ago|reply
[1] https://superuser.com/a/859719
[+] [-] dandanua|3 years ago|reply
[+] [-] LeoPanthera|3 years ago|reply
Is there any evidence that 2048 bit RSA keys are insufficient?
4096 bit keys are absolutely huge. I don't know if working with them is also slower, but I would guess so.