Linux - SoftwareThis forum is for Software issues.
Having a problem installing a new program? Want to know which application is best for the job? Post your question in this forum.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
$ ps -ef | grep sshd
my_username 2314 2296 0 10:25 pts/0 00:00:00 grep --color=auto sshd
$ netstat -plan | grep ":22"
(Not all processes could be identified, non-owned process info
will not be shown, you would have to be root to see it all.)
$ sudo netstat -plan | grep ":22"
[sudo] password for my_username:
The result of the last command (netstat) is blank. Does it says that SSH isn't listening and therefore I'm safe?
How can I disable it from running?
I read "Yes, there's a nasty new botnet infecting Linux devices, but your personal PC is probably safe. Here's why." and I worry. I'm still only a few years using Linux Mint 17 (on 17.2 now).
(If the server ran on some other port, add it with the -p option, like "ssh localhost -p 1234")
If you get "connection refused" or similar, then it's not running. If you get a password prompt, a "Permission denied (publickey)" (or similar), or even a shell prompt, SSH is alive and well.
if you didnt spend hours reading instructions and configuring IT IS NOT working
install ssh fresh, in debian (up to sqeeze anyhows) it "makes a key" and takes a while doing it the use "tcpdump" or some tool while using ssh between two hosts on a lan the data is CLEAR TEXT. that key made is bogus in that it is not used by default for anything.
ssh injects it's headers into your tcp headers but offers NO SECURITY unless you delve into all it's configs and key gens and get it "to work" anyone telling you otherwise is probably a hack or a foreign military HOPING YOU WONT KNOW
How, exactly, does it 'inject' it's headers into your TCP headers?? Where did you come up with this??? There is nothing in this post that is accurate, and spreading misinformation isn't a good thing.
if you didnt spend hours reading instructions and configuring IT IS NOT working
install ssh fresh, in debian (up to sqeeze anyhows) it "makes a key" and takes a while doing it
the use "tcpdump" or some tool while using ssh between two hosts on a lan
the data is CLEAR TEXT. that key made is bogus in that it is not used by default for anything.
ssh injects it's headers into your tcp headers but offers NO SECURITY unless you delve into all it's configs and key gens and get it "to work"
---------- Post added 10-19-15 at 05:02 PM ----------
anyone telling you otherwise is probably a hack or a foreign military HOPING YOU WONT KNOW
Can you please remain silent if all you have is an false opinion w/ no knowledge or experience to back it?
Your statements are blatantly wrong, and I'm strongly tempted to remove them from the forum.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.