SSH
Chester Wyke October 19, 2023 Updated: April 15, 2025 #debian
debian (Series)
MAC Address Change
Set permissions recursively on directory structure
Touch (Set file modified date)
Android Apps on Linux
Blacklist Module
Calender Notifications Popup Disable
CUPS PDF Printer
gping
Hide Mounts
Nautilus
Power
Smartgit
Video Cards
Snapcraft
Acrobat Reader
Audio
Shortcuts (Important)
DNS
Mounting Drives
Setup Network Shares
Cron
Startup
Users and Groups
Paths to remember
Manually Removing Old Kernels
Set Icon for Application
Strange Problems and Fixes
Redirecting stderr
Extensions
Ubuntu Software
Show Seconds on Clock Display
Create Bootable Flash Drive
Compressed Files
services systemd (unit)
SCP
SSH
Updating
Useful commands
Firewall
View Whitespace
OpenVPN
PPP logs
MAN
Terminal
sed
Characters
zsh
Links between files
7z encrypted file
Wayland or x11?
Delete Old Files Automatically
MAC Address Change
Set permissions recursively on directory structure
Touch (Set file modified date)
Android Apps on Linux
Blacklist Module
Calender Notifications Popup Disable
CUPS PDF Printer
gping
Hide Mounts
Nautilus
Power
Smartgit
Video Cards
Snapcraft
Acrobat Reader
Audio
Shortcuts (Important)
DNS
Mounting Drives
Setup Network Shares
Cron
Startup
Users and Groups
Paths to remember
Manually Removing Old Kernels
Set Icon for Application
Strange Problems and Fixes
Redirecting stderr
Extensions
Ubuntu Software
Show Seconds on Clock Display
Create Bootable Flash Drive
Compressed Files
services systemd (unit)
SCP
SSH
Updating
Useful commands
Firewall
View Whitespace
OpenVPN
PPP logs
MAN
Terminal
sed
Characters
zsh
Links between files
7z encrypted file
Wayland or x11?
Delete Old Files Automatically
Install
Whitelisting users
Source: https://ostechnix.com/allow-deny-ssh-access-particular-user-group-linux/
Open config
At the bottom of the file add AllowUsers
then a tab (or a space, based on my testing) then a list of users separated
by space
Other users will be blocked.
AllowUsers user1 user2 user3
Then restart the service
Check fingerprint from server
Source: https://askubuntu.com/questions/76337/where-is-the-ssh-server-fingerprint-generated-stored
When connecting to the server you are asked to verify the fingerprint. To get that fingerprint use the following command (may need to be modified if you are not using ED25519).
NB: Must be run on the server