09-06-2016
Better still, why not set up ssh keys with no passphrases? For added security the known_hosts file on each server could be set up so the key in question can only be used for certain commands.
Andrew
9 More Discussions You Might Find Interesting
1. Cybersecurity
Eh... yeah. What the title says. :D (1 Reply)
Discussion started by: PSC
1 Replies
2. Shell Programming and Scripting
I am using Net::SSH::Expect to connect to the device(iLO) with SSH. After the $ssh->login() I'm able to view the prompt, but not able to send any coommands.
With the putty I can connect to the device and execute the commands without any issues.
Here is the sample script
my $ssh =... (0 Replies)
Discussion started by: hansini
0 Replies
3. Shell Programming and Scripting
Hi,
I want to use ssh to add a register key on remote ssh server. Since there are space characters in my register key string, it always failed. If there is no space characters in the string, it worked fine. The following is what I have tried. It seems that "ssh" command doesn't care about double... (9 Replies)
Discussion started by: leaftree
9 Replies
4. UNIX for Dummies Questions & Answers
This issue was resolved due to using the correct user transferring the file over to the desktop. (1 Reply)
Discussion started by: Computergal2104
1 Replies
5. Shell Programming and Scripting
I have write a script which contains
ssh -p 12345 dcplatform@10.125.42.50
ssh 127.0.0.1 -p 5555 "$CMD"
ssh root@$GUEST_IP "$CMD"
before I use public key, it works well, now I want to change to "expect", BUT I don't want to change above code and "parameter position"
I can post a... (1 Reply)
Discussion started by: yanglei_fage
1 Replies
6. UNIX for Dummies Questions & Answers
I'm trying to setup a link between my home pc (work-machine) and a server at work (tar-machine) that is behind a gateway (hop-machine) and not directly accessible.
my actions:
work-machine$ ssh -L 1234:tar-machine:22 hop-machine
work-machine$ ssh -p 1234 user@127.0.0.1
- shh access on... (1 Reply)
Discussion started by: Vathau
1 Replies
7. Shell Programming and Scripting
I'm using redhat and have an odd issue with a nested ssh call.
ssh -i ~/.ssh/transfer-key -q transfer@fserver1 ]
&& ssh -i ~/.ssh/transfer-key transfer@fserver1 "ssh -i ~/.ssh/sftp-key sftpin@10.0.0.1 ]"
&& ssh -i ~/.ssh/transfer-key transfer@fserver1 "scp -i ~/.ssh/sftp-key /home/S/outbox/*... (2 Replies)
Discussion started by: say170
2 Replies
8. UNIX for Beginners Questions & Answers
Hi,
I want to validate ssh connection one after one for multiple servers..... password less keys already setup but now i want to validate if ssh is working fine or not...
I have .sh script like below and i have servers.txt contains all the list of servers
#/bin/bash
for host in $(cat... (3 Replies)
Discussion started by: sreeram4
3 Replies
9. Shell Programming and Scripting
Hi,
I am trying to complete my bash script in order to find which SSH servers on LAN are still active with the ssh keys, but i am frozen at this step:
#!/bin/bash
# LAN SSH KEYS DISCOVERY SCRIPT
</etc/passwd \
grep /bin/bash |
cut -d: -f6 |
sudo xargs -i -- sh -c '
&& cat... (11 Replies)
Discussion started by: syrius
11 Replies
LEARN ABOUT DEBIAN
openpgp2ssh
OPENPGP2SSH(1) BSD General Commands Manual OPENPGP2SSH(1)
NAME
openpgp2ssh -- translate OpenPGP keys to SSH keys
SYNOPSIS
openpgp2ssh < mykey.gpg
gpg --export $KEYID | openpgp2ssh $KEYID
gpg --export-secret-key $KEYID | openpgp2ssh $KEYID
DESCRIPTION
openpgp2ssh takes an OpenPGP-formatted primary key and associated subkeys on standard input, and spits out the requested equivalent SSH-style
key on standard output.
If the data on standard input contains no subkeys, you can invoke openpgp2ssh without arguments. If the data on standard input contains mul-
tiple keys (e.g. a primary key and associated subkeys), you must specify a specific OpenPGP key identifier as the first argument to indicate
which key to export. The key ID is normally the 40 hex digit OpenPGP fingerprint of the key or subkey desired, but openpgp2ssh will accept
as few as the last 8 digits of the fingerprint as a key ID.
If the input contains an OpenPGP RSA public key, it will be converted to the OpenSSH-style single-line keystring, prefixed with the key type
(`ssh-rsa'). This format is suitable (with minor alterations) for insertion into known_hosts files and authorized_keys files.
If the input contains an OpenPGP RSA secret key, it will be converted to the equivalent PEM-encoded private key.
openpgp2ssh is part of the monkeysphere(7) framework for providing a PKI for SSH.
CAVEATS
The keys produced by this process are stripped of all identifying information, including certifications, self-signatures, etc. This is
intentional, since ssh attaches no inherent significance to these features.
openpgp2ssh will produce output for any requested RSA key. This means, among other things, that it will happily export revoked keys, unveri-
fiable keys, expired keys, etc. Make sure you do your own key validation before using this tool!
EXAMPLES
gpg --export-secret-key $KEYID | openpgp2ssh $KEYID | ssh-add -c /dev/stdin
This pushes the secret key into the active ssh-agent(1). Tools such as ssh(1) which know how to talk to the ssh-agent(1) can now rely on the
key.
AUTHOR
openpgp2ssh and this man page were written by Daniel Kahn Gillmor <dkg@fifthhorseman.net>.
BUGS
openpgp2ssh only works with RSA keys. DSA keys are the only other key type available in both OpenPGP and SSH, but they are currently unsup-
ported by this utility.
openpgp2ssh only accepts raw OpenPGP packets on standard input. It does not accept ASCII-armored input. openpgp2ssh Currently only exports
into formats used by the OpenSSH. It should support other key output formats, such as those used by lsh(1) and putty(1).
Secret key output is currently not passphrase-protected.
openpgp2ssh currently cannot handle passphrase-protected secret keys on input.
SEE ALSO
pem2openpgp(1), monkeysphere(1), monkeysphere(7), ssh(1), monkeysphere-authentication(8), monkeysphere-host(8)
BSD
March 1,, 2009 BSD