Managing SSH private keys on a public host

I have a web server which is running on a private subnet in AWS VPC, let us call it worker.

I can access the worker VM through a Bastion VM which is in the same VPC but in a public subnet.

Then, I have another VM (public_host) in a public subnet in a different VPC which listenning to the worker VM through SSH tunnel.

inorder to make the SSH tunnel, I need to have the private keys of Bastion and worker on the public_host. I am not security expert, but I guess it is not the best practice to have private keys on the public VM.

can someone please suggest me an approach solve this weak point?

I was thinking to write the listener with the private keys included in a Go app, then compile it and deploy the compiled binaries on the public_host. Would it be considered a more secure approach?

Is it security risk to host CS:GO server on my pc?

I have quite a good hardware in my pc + optic fiber connection. I opened a CS:GO (counter strike global offensive) server on it, and made it public. The ip for connecting to this server is my public ip address.

I set a strong password to the router admin (24+ characters). I assured that I have no risky\unwanted ports open. So in short, except for DDoS attacks, is this setup risky in any way?

Best Seller Hosting | $1/M | SSD | Free Backups | Free DDoS | Lets Encrypt SSL – Host is a Cheap & BUDGET, yet FAST and RELIABLE web hosting provider. We have staff available 24/7 to provide nearly instant support to all of our customers when they need. You can be certain that your site almost has zero downtime as long as you have an active service with us. We own our web server, which is an advantage for our customers since we immediately react if there is anything unusual with the server, or if any customer needs to install custom software.

We have perfectly set the platform in the form of free hosting for beginners, they can learn what hosting is and how easy to handle tasks related to our control panel. Also, we offer freedom to clients to upgrade their service to any higher plan from free hosting to high config plans. I am sure that no one can do that but our intention for doing this just has of the free learning experience for such beginners. We have HDD and SSD hosting starting from $0.5 per month based on unlimited features. So if you are looking for a long term, reliable, and professional shared hosting server, do give us a try. We have a 30-day money-back policy applied to all customers. You are absolutely safe when signing up with us.

Available locations include Canada, New York, UK, Singapore, Germany, Australia and now France!

Features Come With Shared Hosting Plans :

– cPanel
– Website Builder (Standard+Pro)
– Softaculous
– Unlimited space
– Unlimited Bandwidth
– Cloudflare
– Free SSL certificates
– PHP Selector (5.x-7.x)
– ModSecurity
– SSH For SSD Hosting Only
– Dedicated IP (optional, $2/month)
– CloudLinux
– 24/7/365 Support
– 99.9% Guaranteed Server Up-Time
– Antivirus and Mal-ware Protection
– DDOS protection enabled
– No Contracts, No Catch
– 30 Days Money Back Guarantee
– Free Migration Service
– Max RAM Assigned
– Multiple GEO locations
– Free Setup Budget Hosting Provider | Cheap Hosting Provider | Cheap cPanel Hosting | $1 Unlimited hosting | Fast SSD Hosting | Money back Hosting | Best Seller hosting | ideal free hosting | free web hosting

Thank you.

Why do Invalid Host header errors exist, what are attackers trying to achieve?

I have recently launched a new django based api, and quite quickly, I started to receive INVALID_HOST_HEADER SOME RANDOM URL errors. My understanding is that this is caused by somebody manually changing the HOST header, or proxying my API through some other domain.

This is probably a basic question, but what is the point? What are they trying to achieve? Presumably it’s not a regular MITM attack, because it would be easy enough to correct the HOST header on its way out of the middle server, and they’re not doing so.

If a body possessed by a user of Magic Jar is Feebleminded, and the possessor leaves the host body, who was Feebleminded?

Consider that I am possessing a host using magic jar, and that while I am possessing the host, I am subjected to the feeblemind spell and fail my saving throw.

For whatever reason after this, I decide to the leave the host body and return to the container of magic jar. Well, now a question arises: who continues to suffer the effects of feeblemind?

Creating secure virtual machine that nobody can see its content including the host machine?

This problem is completely different from “running malware in a VM”! Suppose I want to have a virtual machine running some software with secret data. But I do not have complete control of the host machine, i.e. hackers can happily play on the host machine. Then, is it possible that my VM is still safe? For instance, without knowing the password, the hackers can never see what is inside the VM even though they get control of the host?

(P.S. Maybe by using some kind of full-disk encryption? But what about the memory… And when the VM is executing commands, the host can see that, cannot it?)

Thanks for any ideas!

When I try to SSH into my computer through its public IP the server’s host key fingerprint is different?

When I SSH into it through my local network, and when I actually go and check with ssh-keygen I get 1 rsa fingerprint. And when I try to SSH in though my public IP I get a different host fingerprint shown in putty. This host fingerprint does not appear to be the fingerprint of any of the host keys (or even client keys, I checked) on my server. It is totally unknown to me.

Am I the victim of an attempted man-in-the-middle attack? And if so, is there anything I can do so that I can actually SSH into my server remotely without compromising my server’s security?

Are the following two ways to obtain server certificates for web servers to host web applications? says for running a flask web application with gunicorn and nginx with https:

Certbot provides a variety of ways to obtain SSL certificates through plugins. The Nginx plugin will take care of reconfiguring Nginx and reloading the config whenever necessary. To use this plugin, type the following:

sudo certbot --nginx -d your_domain -d www.your_domain 

This runs certbot with the –nginx plugin, using -d to specify the names we’d like the certificate to be valid for. says that for running an web application with https:

On Ubuntu the standard mechanism would be:**

  • dotnet dev-certs https -v to generate a self-signed cert
  • convert the generated cert in ~/.dotnet/corefx/cryptography/x509stores/my from pfx to pem using openssl pkcs12 -in <certname>.pfx -nokeys -out localhost.crt -nodes
  • copy localhost.crt to /usr/local/share/ca-certificates
  • trust the certificate using sudo update-ca-certificates
  • verify if the cert is copied to /etc/ssl/certs/localhost.pem (extension changes)
  • verify if it’s trusted using openssl verify localhost.crt

I was wondering if the above two ways are to achieve the same goal as obtaining a server certificate for a web server to host a web application?

Specifically, do the single certbot command and the dotnet dev-certs https and openssl commands do the same thing?

Are the two ways working directly on web servers, instead of web applications?

Can the two ways replace each other in their use case scenarios? (suppose dotnet dev-certs https would work on Ubuntu, for simplifying my questions.)

I am new to digital certificate, and have seen the above two approaches for different web application frameworks, and am trying to understand the commonality.


Host Protected Area (HPA) Imaging

y’all. I’m a student in the Digital Forensics department. I have to create an image of the HPA of my disk. I searched whole documents about creating HPA image ways but all of them worn methods. For instance, The Sleuth Kit version 1.7.3 allows to create it but it was released in 2003 and the newest versions of TSK have no option to do that. I wonder that is there any way to create and investigate HPA part of my disk.

VirtualBox + VPN with Win10 Host – how secure is it?

I got a notebook from my company running windows 10 which i am officially allowed to use privately. I have to travel a lot i don’t want to carry a second notebook. Since the admins are having access to the device, like for company administered browsers oder updates or whatever, i don’t want to use it without an extra layer of protection.

So i installed a VBox with a mint guest. The virtual drive is encrypted. Inside the guest system i installed mullvad vpn.

How safe is this setup? Is there any possibility to check if there is maybe a keylogger or something like that running in the host system compromising my security? Where are the potential pitfalls of this setup?

I don’t want to use it for illegal things (of course) but i don’t want my company to be able to read private mails, chats, know my account balance when i check my credit card bill abroad, see what i watch on netflix or whatever, see what i shopped and stuff like that. (Or see that i type this 😉 )

What’s your opinion on that?

Thank you and best regards