INC-2026-04-07-001: Prevention
Prevention
Short-term (This Week)
-
Add SSH config block for reverse tunnel access — Evan
Host razer-tunnel HostName localhost Port 2222 User evanusmodestus IdentityFile ~/.ssh/id_ed25519_d000 -
Load keys into agent on login — add
ssh-add ~/.ssh/id_ed25519_d000to shell profile or useAddKeysToAgent yesin SSH config — Evan -
Document reverse tunnel procedure in infrastructure runbook — Evan
Long-term (This Quarter)
-
Evaluate Tailscale as VLAN-agnostic SSH path — bypasses firewall restrictions entirely — Evan
-
Add VyOS rule for P16g→Razer SSH on management VLAN — assess whether VLAN 50→10 SSH should be permitted for admin hosts — Evan
-
Create
~/.ssh/configblock for each machine with explicitIdentityFilefor direct and tunnel access — Evan
Lessons Learned
What Went Well
-
Reverse SSH tunnel was identified and deployed within 5 minutes
-
StrictHostKeyCheckingcorrectly prevented connection to mismatched host key — security control worked as designed -
ssh -vvvdebug output immediately revealed the empty agent and missing default keys
What Could Be Improved
-
No documented procedure for cross-VLAN SSH access when direct path is blocked
-
SSH agent not auto-loaded after reboot — 16 keys available but none offered
-
sudo sshwas attempted before diagnosing — wasted a step
Key Takeaways
|