SSH/Public Key Authentication: Difference between revisions
Jump to navigation
Jump to search
(5 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
==RSA== | |||
<syntaxhighlight lang="bash"> | <syntaxhighlight lang="bash"> | ||
#################### CLIENT SIDE #################### | #################### CLIENT SIDE #################### | ||
Line 57: | Line 58: | ||
ssh [email protected] -p 4321 | ssh [email protected] -p 4321 | ||
# [email protected]: Permission denied (publickey,gssapi-keyex,gssapi-with-mic). | # [email protected]: Permission denied (publickey,gssapi-keyex,gssapi-with-mic). | ||
</syntaxhighlight> | |||
===RSA » Temp Key=== | |||
---- | |||
<syntaxhighlight lang="bash"> | |||
TMP_PUBLIC_KEY=$(mktemp -u) | |||
TMP_PRIVATE_KEY=$(mktemp -u) | |||
ssh-keygen -t rsa -b 4096 -C "[email protected]" -N "" -q -f ${TMP_PRIVATE_KEY} | |||
ssh-keygen -y -f ${TMP_PRIVATE_KEY} > ${TMP_PUBLIC_KEY} | |||
export SSH_PRIVATE_KEY="$(cat ${TMP_PRIVATE_KEY})" | |||
export SSH_PUBLIC_KEY="$(cat ${TMP_PUBLIC_KEY})" | |||
rm ${TMP_PRIVATE_KEY} ${TMP_PUBLIC_KEY} | |||
echo && echo "${SSH_PRIVATE_KEY}" | |||
echo && echo "${SSH_PUBLIC_KEY}" && echo | |||
</syntaxhighlight> | </syntaxhighlight> | ||
Line 65: | Line 82: | ||
chmod 600 ~/.ssh/id_ed25519 | chmod 600 ~/.ssh/id_ed25519 | ||
chmod 644 ~/.ssh/id_ed25519.pub | chmod 644 ~/.ssh/id_ed25519.pub | ||
===EdDSA » Temp Key=== | |||
---- | |||
<syntaxhighlight lang="bash"> | |||
TMP_PUBLIC_KEY=$(mktemp -u) | |||
TMP_PRIVATE_KEY=$(mktemp -u) | |||
ssh-keygen -t ed25519 -C "[email protected]" -N "" -q -f ${TMP_PRIVATE_KEY} | |||
ssh-keygen -y -f ${TMP_PRIVATE_KEY} > ${TMP_PUBLIC_KEY} | |||
export SSH_PRIVATE_KEY="$(cat ${TMP_PRIVATE_KEY})" | |||
export SSH_PUBLIC_KEY="$(cat ${TMP_PUBLIC_KEY})" | |||
rm ${TMP_PRIVATE_KEY} ${TMP_PUBLIC_KEY} | |||
echo && echo "${SSH_PRIVATE_KEY}" | |||
echo && echo "${SSH_PUBLIC_KEY}" && echo | |||
</syntaxhighlight> | |||
==Too Many Auth== | ==Too Many Auth== |
Latest revision as of 17:08, 13 December 2024
RSA
#################### CLIENT SIDE ####################
# generating a new ssh key and adding it to the ssh client
# https://gist.github.com/shahedhossain/7d91028ba1eb9c56049ea421a12e76fd
# ssh key generation for chorke
ssh-keygen -t rsa -b 4096 -C "[email protected]"
# Generating public/private rsa key pair.
# Enter a file in which to save the key (/Users/user/.ssh/id_rsa): [Press enter]
# Enter passphrase (empty for no passphrase): [Type a passphrase]
# Enter same passphrase again: [Type passphrase again]
# rpi_chorke_rsa add to ~/.ssh/config
Host rpi.chorke.org
HostName 139.59.51.80
# PreferredAuthentications publickey
IdentityFile ~/.ssh/rpi_chorke_rsa
Port 4321
# copy root/misc public key to ~/.ssh/authorized_keys for each users
ssh-copy-id -i ~/.ssh/rpi_chorke_rsa.pub [email protected] -p 4321
ssh-copy-id -i ~/.ssh/rpi_chorke_rsa.pub [email protected] -p 4321
#################### SERVER SIDE ####################
# for disable password authentication
# & enable public key authentication
# edit by /etc/ssh/sshd_config
PasswordAuthentication no
PubkeyAuthentication yes
# after edit save & exit restart sshd
# to update sshd configuration
# systemctl restart sshd
service sshd restart
#################### CLIENT SIDE ####################
# root user public key
ssh [email protected]
# Enter passphrase for key '/Users/user/.ssh/rpi_chorke_rsa':
# misc user public key
ssh [email protected]
# Enter passphrase for key '/Users/user/.ssh/rpi_chorke_rsa':
#################### CLIENT SIDE ####################
# root user password disabled
ssh [email protected] -p 4321
# [email protected]: Permission denied (publickey,gssapi-keyex,gssapi-with-mic).
# misc user password disabled
ssh [email protected] -p 4321
# [email protected]: Permission denied (publickey,gssapi-keyex,gssapi-with-mic).
RSA » Temp Key
TMP_PUBLIC_KEY=$(mktemp -u)
TMP_PRIVATE_KEY=$(mktemp -u)
ssh-keygen -t rsa -b 4096 -C "[email protected]" -N "" -q -f ${TMP_PRIVATE_KEY}
ssh-keygen -y -f ${TMP_PRIVATE_KEY} > ${TMP_PUBLIC_KEY}
export SSH_PRIVATE_KEY="$(cat ${TMP_PRIVATE_KEY})"
export SSH_PUBLIC_KEY="$(cat ${TMP_PUBLIC_KEY})"
rm ${TMP_PRIVATE_KEY} ${TMP_PUBLIC_KEY}
echo && echo "${SSH_PRIVATE_KEY}"
echo && echo "${SSH_PUBLIC_KEY}" && echo
EdDSA
ssh-keygen -t ed25519 -C "[email protected]" ssh-keygen -t ed25519 -C "[email protected]" -f ~/.ssh/id_ed25519
chmod 600 ~/.ssh/id_ed25519 chmod 644 ~/.ssh/id_ed25519.pub
EdDSA » Temp Key
TMP_PUBLIC_KEY=$(mktemp -u)
TMP_PRIVATE_KEY=$(mktemp -u)
ssh-keygen -t ed25519 -C "[email protected]" -N "" -q -f ${TMP_PRIVATE_KEY}
ssh-keygen -y -f ${TMP_PRIVATE_KEY} > ${TMP_PUBLIC_KEY}
export SSH_PRIVATE_KEY="$(cat ${TMP_PRIVATE_KEY})"
export SSH_PUBLIC_KEY="$(cat ${TMP_PUBLIC_KEY})"
rm ${TMP_PRIVATE_KEY} ${TMP_PUBLIC_KEY}
echo && echo "${SSH_PRIVATE_KEY}"
echo && echo "${SSH_PUBLIC_KEY}" && echo
Too Many Auth
too many authentication failures issue ssh -o PreferredAuthentications=password ${USER}@academia.local ssh -o IdentityAgent=none ${USER}@academia.local ssh -o IdentitiesOnly=yes ${USER}@academia.local |
Host *.local IdentityAgent none IdentitiesOnly yes PreferredAuthentications password |
Host 10.19.83.* IdentityAgent none IdentitiesOnly yes PreferredAuthentications password |