Displaying 20 results from an estimated 9000 matches similar to: "shared private key"
2015 Apr 22
2
shared private key
On Wed, Apr 22, 2015 at 10:55 AM, ?ngel Gonz?lez <keisial at gmail.com> wrote:
> On 22/04/15 16:42, Reuben Hawkins wrote:
>>
>> Hi SSH-devs,
>>
>> This may be a bit off topic for this list, but....
>>
>> Would it be ok to share a private key in an installer script so long
>> as the corresponding public key is setup like this...
>>
>>
2015 Apr 22
3
shared private key
On Wed, Apr 22, 2015 at 1:53 PM, Gert Doering <gert at greenie.muc.de> wrote:
> Hi,
>
> On Wed, Apr 22, 2015 at 01:26:06PM -0700, Reuben Hawkins wrote:
>> Let me know if I'm missing something. :)
>
> Signed keys from a common CA?
I don't think the signed key helps in my particular case (I may be
wrong, if so please correct me).
I'm working on a management
2015 Apr 23
16
[Bug 2388] New: build fixups for --without-openssl
https://bugzilla.mindrot.org/show_bug.cgi?id=2388
Bug ID: 2388
Summary: build fixups for --without-openssl
Product: Portable OpenSSH
Version: 6.8p1
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: Build system
Assignee: unassigned-bugs at
2011 Oct 03
2
sshkey resource type in Ubuntu 10.04
Hi,
I''m attempting to distribute a known host ssh key (for github) to an
Ubuntu 10.04 host. Puppet is distributing the key into /etc/ssh/
ssh_known_hosts as:
github.com ssh-rsa [really long ssh-rsa key]
However, Ubuntu seems to expect the key in this format:
|1|[really long ssh-rsa key]
(note all the keys in my known_hosts and ssh_known_hosts not managed
by puppet are prepended with
2017 Jan 28
3
known_hosts question for Ubuntu Server 14.04 and 16.04 LTS
Hello & thanks for reading.
I'm having a problem configuring known_hosts from scripts so an accept
key yes/no prompt doesn't appear.
I'm using this command to detect if the server is known and add it to
known_hosts:
if ! ssh-keygen -F ${IP_ADDR} -f ~/.ssh/known_hosts > /dev/null 2>&1; t
hen ssh-keyscan -p ${PORT} ${IP_ADDR} >> ~/.ssh/known_hosts; fi
This works
2015 Feb 19
34
Call for testing: OpenSSH 6.8
Hi,
OpenSSH 6.8 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This release contains
some substantial new features and a number of bugfixes.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable OpenSSH is
2007 Jun 05
9
[Bug 1319] New: ssh-keygen does not properly handle multiple keys
http://bugzilla.mindrot.org/show_bug.cgi?id=1319
Summary: ssh-keygen does not properly handle multiple keys
Product: Portable OpenSSH
Version: 4.5p1
Platform: Other
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh-keygen
AssignedTo: bitbucket at mindrot.org
2023 Mar 10
3
Call for testing: OpenSSH 9.3
Hi,
OpenSSH 9.3p1 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This is a bugfix release.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable OpenSSH is also available via git using the
instructions at
2002 Jan 10
4
Potential SSH2 exploit
I just noticed (at least on OpenSSH 3.0p1) that even though I have both RSA
and DSA keys available in sshd_config on a server, only a ssh-rsa line
shows up in known_hosts on the client side, not a ssh-dss line (that
priority may come from the fact that my RSA key is listed before my DSA key
in sshd_config). If I comment out the RSA key in sshd_config and restart
the server, then the next time the
2020 Oct 30
3
[Bug 3226] New: Feature request: Prempt fingerprint prompt when connecting to new server
https://bugzilla.mindrot.org/show_bug.cgi?id=3226
Bug ID: 3226
Summary: Feature request: Prempt fingerprint prompt when
connecting to new server
Product: Portable OpenSSH
Version: 8.4p1
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component:
2010 Apr 02
2
AuthorizedKeysFile with default value prevents Public/Private key authentication
Hi All,
I noticed that if I put:
AuthorizedKeysFile .ssh/authorized_keys in my sshd_config file,
pub/priv key authentication no longer worked.
I am using OpenSSH_5.4p1, OpenSSL 0.9.8n 24 Mar 2010
on Archlinux.
Sam
****************** Here is my WORKING config ******************
Port 22
ListenAddress 0.0.0.0
Protocol 2
PermitRootLogin no
PubkeyAuthentication yes
#AuthorizedKeysFile
2012 Feb 12
2
Key auth question
I have a problem getting key authentication to work with one remote user
(git), even though it works fine for the remote user "root". The remote
file .ssh/authorized_keys is identical for both users - I cp'ed it from
the root account to the git home dir.
On local machine (OS X, by the way) I have:
$ cd
$ ls -l .ssh
-rw------- 1 jussihirvi staff 668 Aug 24 16:13 id_rsa
(the
2009 Jun 16
2
there should be an authorized_keys(5) man page
Hi.
On
http://openssh.org/manual.html
I think there should be
authorized_keys(5)
known_hosts(5)
Can an authorized_keys entry say something like
from=192.168.1.32,192.168.1.33 command=/bin/foo ...
or do I need to make a separate entry for each IP address?
Thanks
Dave
2015 Apr 22
2
non-openssl build fixes
The attached patches fixes and cleans up the build when configured
with --without-openssl.
Summary:
* Fix KEX_SERVER_ENCRYPT macro in myproposal.h
* Fix unresolved symbols in ssh-keygen.c
* Isolate openssl code and extend WITH_OPENSSL wrappers around it
* Make ed25519 default key type in ssh-keygen when configured --without-openssl
-------------- next part --------------
A non-text attachment was
2001 Jan 03
1
OpenSSH 2.3 on Tru Unix: Problems
Hi,
I try to get OpenSSH working on Compaq's Tru64 Unix (alias Digital Unix)
Version 5.1.
It compiles smootly with OpenSSL-0.9.6, but I observer some odd things.
(A) AS SERVER
The authenification via .ssh/known_host doesn't work.
I have the same sshd_config as on FreeBSD (OpenSSH 2.2.0), where it works.
sshd -d -d:
-----------
debug1: sshd version OpenSSH_2.3.0p1
...
RSA key generation
2014 Feb 18
1
[PATCH] verify against known fingerprints
I've just written this patch, it's undergone minimal testing and "works
for me" and I'm after feedback as to acceptability of approach, anything
I should be doing differently for the feature to be acceptable upstream
and what I should be doing about automated testing.
Use-case: you have the host's SSH fingerprints via an out-of-band
mechanism which you trust and want to
2015 Oct 12
2
ssh-keyscan non-standard port broken
Hello,
If one passes the -p option for a non-standard port to ssh-keyscan when
using the -f option to pull hosts from a file, it results in a
known_hosts entry that is incorrect:
micah at muck$ cat /tmp/try
199.254.238.47 micah.riseup.net,199.254.238.47
ssh-keyscan -t rsa -p 4422 -f /tmp/try > /tmp/known
micah at muck$ cat /tmp/known
[micah.riseup.net,199.254.238.47]:4422 ssh-rsa
2010 Mar 29
18
please decrypt your manuals
I. most of ssh manual and all sshd manual present server and client as one machine, called host. All files mentioned are placed on one machine. This is incorrect, and makes the explanation unclear. For example, man sshd SSH_KNOWN_HOSTS FILE FORMAT suggests to copy keys from /etc/ssh/ssh_host_key.pub into /etc/ssh/ssh_known_hosts, as if those files are on the same machine.
II. a general
2002 Feb 12
4
Rsync with script
Hi,
I am trying to mirror a server every night using rsync. I have to backup
multiple directories and multiple individual files. I also want to use ssh
as transport.
The problem is that I cannot get ssh to work without asking password for
each step. I tried the public key thing but it doesnt work.
Can some one give instructions for a layman like me.
Also I want to know how to pass argument to
2020 Sep 29
2
Human readable .ssh/known_hosts?
On 29.09.20 12:44, Damien Miller wrote:
> On Tue, 29 Sep 2020, Martin Drescher wrote:
>
>> Hi list members,
[...]> You can however find and delete hosts by name using ssh-keygen.
>
> To find entries matching a hostname, use "ssh-keygen -F hostname", e.g.
The point is, file has over 600 hashes stored.
> $ ssh-keygen -lF haru.mindrot.org
> # Host