RSA
#################### CLIENT SIDE ####################
# generating a new ssh key and adding it to the ssh client
# https://gist.github.com/shahedhossain/7d91028ba1eb9c56049ea421a12e76fd
# ssh key generation for chorke
ssh-keygen -t rsa -b 4096 -C "[email protected]"
# Generating public/private rsa key pair.
# Enter a file in which to save the key (/Users/user/.ssh/id_rsa): [Press enter]
# Enter passphrase (empty for no passphrase): [Type a passphrase]
# Enter same passphrase again: [Type passphrase again]
# rpi_chorke_rsa add to ~/.ssh/config
Host rpi.chorke.org
HostName 139.59.51.80
# PreferredAuthentications publickey
IdentityFile ~/.ssh/rpi_chorke_rsa
Port 4321
# copy root/misc public key to ~/.ssh/authorized_keys for each users
ssh-copy-id -i ~/.ssh/rpi_chorke_rsa.pub [email protected] -p 4321
ssh-copy-id -i ~/.ssh/rpi_chorke_rsa.pub [email protected] -p 4321
#################### SERVER SIDE ####################
# for disable password authentication
# & enable public key authentication
# edit by /etc/ssh/sshd_config
PasswordAuthentication no
PubkeyAuthentication yes
# after edit save & exit restart sshd
# to update sshd configuration
# systemctl restart sshd
service sshd restart
#################### CLIENT SIDE ####################
# root user public key
ssh [email protected]
# Enter passphrase for key '/Users/user/.ssh/rpi_chorke_rsa':
# misc user public key
ssh [email protected]
# Enter passphrase for key '/Users/user/.ssh/rpi_chorke_rsa':
#################### CLIENT SIDE ####################
# root user password disabled
ssh [email protected] -p 4321
# [email protected]: Permission denied (publickey,gssapi-keyex,gssapi-with-mic).
# misc user password disabled
ssh [email protected] -p 4321
# [email protected]: Permission denied (publickey,gssapi-keyex,gssapi-with-mic).
RSA » Temp Key
TMP_PUBLIC_KEY=$(mktemp -u)
TMP_PRIVATE_KEY=$(mktemp -u)
ssh-keygen -t rsa -b 4096 -C "[email protected]" -N "" -q -f ${TMP_PRIVATE_KEY}
ssh-keygen -y -f ${TMP_PRIVATE_KEY} > ${TMP_PUBLIC_KEY}
export SSH_PRIVATE_KEY="$(cat ${TMP_PRIVATE_KEY})"
export SSH_PUBLIC_KEY="$(cat ${TMP_PUBLIC_KEY})"
rm ${TMP_PRIVATE_KEY} ${TMP_PUBLIC_KEY}
echo && echo "${SSH_PRIVATE_KEY}"
echo && echo "${SSH_PUBLIC_KEY}" && echo
EdDSA
ssh-keygen -t ed25519 -C "[email protected]"
ssh-keygen -t ed25519 -C "[email protected]" -f ~/.ssh/id_ed25519
chmod 600 ~/.ssh/id_ed25519
chmod 644 ~/.ssh/id_ed25519.pub
EdDSA » Temporary
TMP_PUBLIC_KEY=$(mktemp -u)
TMP_PRIVATE_KEY=$(mktemp -u)
ssh-keygen -t ed25519 -C "[email protected]" -N "" -q -f ${TMP_PRIVATE_KEY}
ssh-keygen -y -f ${TMP_PRIVATE_KEY} > ${TMP_PUBLIC_KEY}
export SSH_PRIVATE_KEY="$(cat ${TMP_PRIVATE_KEY})"
export SSH_PUBLIC_KEY="$(cat ${TMP_PUBLIC_KEY})"
rm ${TMP_PRIVATE_KEY} ${TMP_PUBLIC_KEY}
echo && echo "${SSH_PRIVATE_KEY}"
echo && echo "${SSH_PUBLIC_KEY}" && echo
Too Many Auth
too many authentication failures issue
ssh -o PreferredAuthentications=password ${USER}@academia.local
ssh -o IdentityAgent=none ${USER}@academia.local
ssh -o IdentitiesOnly=yes ${USER}@academia.local
|
Host *.local
IdentityAgent none
IdentitiesOnly yes
PreferredAuthentications password
|
Host 10.19.83.*
IdentityAgent none
IdentitiesOnly yes
PreferredAuthentications password
|
References