article-main

How to unlock a LUKS volume on boot on Raspberry Pi OS

LUKS (Linux Unified Key Setup) is the de facto standard encryption method used on Linux-based operating systems. As we saw in previous tutorials, when we want a partition or raw disk encrypted using LUKS to be automatically unlocked at boot, we need to enter a dedicated line into the /etc/crypttab file. Doing so, we are prompted to provide the encryption password interactively. This is quite straightforward on laptop or desktop machines, but how can we unlock a volume on an headless server? One solution is to use dropbear to get ssh access at an early boot stage, in the initramfs, in order to provide the volume password.

Read more

ssh_exchange_identification read connection reset by peer

ssh_exchange_identification read connection reset by peer

The ssh_exchange_identification read connection reset by peer SSH error is something you may see in your terminal when trying to log in to a remote host or when your session expires on a Linux system. In this tutorial, we will go over a few different causes for this error and show you how to troubleshoot the connection on your system. Using one of our methods below will hopefully remedy the error and allow you to log in via SSH or maintain your current session.

Read more

ssh_exchange_identification: connection closed by remote host

ssh_exchange_identification: connection closed by remote host

If you are trying to SSH into a remote host from a Linux system, the ssh_exchange_identification: connection closed by remote host error is one you might encounter when trying to log in. In this tutorial, we will go over a few different causes for this error and show you how to troubleshoot the connection on your system. Using one of our methods below will hopefully remedy the error and allow you to log in via SSH.

Read more

Introduction to Tmux

Introduction to terminal multiplexer Tmux

Tmux is a terminal multiplexer: it let us run and manage multiple terminal sessions from a single screen. This is specially useful when connecting to remote machines using ssh, since, among the other things, it allows us to keep processes started from those terminals running in the background when we disconnect from the session (or logout and close the remote secure shell altogether), letting us re-attach to it at a later time.

Read more

How to enable and disable SSH for user on Linux

How to enable and disable SSH for user on Linux

After installing SSH on your Linux system, one of the most important security practices it to make sure that the service is only enabled for intended accounts. If you have one or more accounts which do not need SSH access, then the service should be disabled for those accounts. This is to prevent one being exploited, or maybe you just do not want that particular user to be using SSH to access the server.

Read more