TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Show HN: Caddy-SSH

280 pointsby m_sahafabout 3 years ago

10 comments

m_sahafabout 3 years ago
Hi everyone! Author here<p>This has been my stress-reliever for the past ~2 years. I&#x27;m sticking around, so feel free to ask any questions.<p>Github Repo: <a href="https:&#x2F;&#x2F;github.com&#x2F;mohammed90&#x2F;caddy-ssh" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;mohammed90&#x2F;caddy-ssh</a>
评论 #30831191 未加载
评论 #30837426 未加载
评论 #30830989 未加载
评论 #30835489 未加载
评论 #30831017 未加载
jon-woodabout 3 years ago
What&#x27;s the benefit of this being built on top of Caddy, which unless I&#x27;m mistaken has historically been an HTTP(S) server? Maybe there&#x27;s someone intrinsically great about how Caddy works for this, but on first glance it feels like the scope creep in servers like Apache, or Curl&#x27;s support for querying every data source under the sun. It can be handy having a single tool that does everything, but at the same time that gives an ever larger attack surface where suddenly your machine has been compromised via instructions from an MQTT server because Curl was installed.
评论 #30831338 未加载
yjftsjthsd-habout 3 years ago
&gt; The ISRG estimates ~80% of the vulnerabilities exploited in the wild are memory safety bugs.<p>Okay, but 1. How many vulnerabilities has openssh shipped, and 2. How many of those were memory issues? I would usually be tentatively on board, but you&#x27;re competing with the OpenBSD folks, who have a shockingly good track record regardless of using C. No offense, but you could write in a formally verified Ada subset and I&#x27;d <i>still</i> hesitate to replace my SSH daemon.<p>(FWIW, I say all of this hoping to be wrong; an alternative implementation, if equally secure, would be great to have.)
评论 #30831663 未加载
评论 #30831573 未加载
评论 #30833757 未加载
评论 #30831229 未加载
评论 #30832531 未加载
评论 #30831597 未加载
评论 #30831741 未加载
评论 #30835726 未加载
评论 #30831135 未加载
sneakabout 3 years ago
Note that outsourcing your key list to a live GitHub URL gives Microsoft unfettered access to your box, should they (or anyone who can compel them, such as the US armed forces) ever want or need it.<p>If you wouldn&#x27;t use Microsoft SSO for local login, you should not thus configure your sshd that way.
评论 #30832644 未加载
g_pabout 3 years ago
This looks very interesting. Is there any support (or plans) for SSH certificates? They help to manage some of the revocation and access control challenges, as well as the issues around trust-on-first-use and similar. (And also the fragility of syncing around authorized-keys files, or relying on LDAP for login, in infrastructure type environments).<p>See also - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=30788544" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=30788544</a>
评论 #30835930 未加载
评论 #30835138 未加载
GordonSabout 3 years ago
Pluggable auth providers for SSH sounds awesome, though I can&#x27;t think of a particular use for it right now!
评论 #30831558 未加载
评论 #30831588 未加载
donatjabout 3 years ago
I&#x27;m not sure I fully understand, what&#x27;s the advantage of getting Caddy involved here versus a fully standalone app?<p>Given the name I&#x27;d at first figured it was an official Caddy project, but that does not seem to be the case.
评论 #30832525 未加载
achairapartabout 3 years ago
Speaking of sane defaults, I wonder how many people are aware that Caddy serves dotfiles by default.
评论 #30834971 未加载
elischleiferabout 3 years ago
Biggest obstacle to proper SSH usage tends to be the creation and management of people&#x27;s private keys. The number of times people have to google for instructions for doing this right is insane. Let&#x27;s get someone working on that.
评论 #30835555 未加载
评论 #30835545 未加载
评论 #30835733 未加载
foxtrottbravoabout 3 years ago
First and foremost, congratulations on bringing the project to this stage - I think it&#x27;s an impressive piece of work.<p>I am in no way qualified to trample on your parade but two things came to my mind that pinch a personal nerve of mine and I would really like to have alleviated by you or the folks who know that stuff:<p>- if your Goal was &quot;secure by default&quot;, why did you allow passwords in the first place? Following Caddys recipe would be more like SSH-Keys only, wouldn&#x27;t it? Is there a reason other than compatibility?<p>- In that same avenue? Why allow such a thing as downloading authorized keys from a third party? Domain takeovers or account compromises on say Github are a thing - so again while it may be a nice usability aspect isn&#x27;t that contrary to the secure by default pradigm?<p>Again thank you for your work and congratulations on the project - those above are just honest questions that came to mind which I would really like to be educated on
评论 #30834461 未加载
评论 #30832877 未加载
评论 #30835720 未加载