SSH publickey auth

Michael Yep myep at remotelink.com
Fri Jul 8 23:15:46 UTC 2005



Alexander Dalloz wrote:

>Am Fr, den 08.07.2005 schrieb Michael Yep um 22:56:
>
>  
>
>>Ok I'm not sure what Top Posting means, but I guess I'll try down here.
>>    
>>
>
>Right :)
>
>http://en.wikipedia.org/wiki/Top-posting
>http://www.fedoraproject.org/wiki/MailingListRules
>
>It helps to better follow a discussion as it allows to comment inline,
>just like you would do if you have a paper in hands and do annotations.
>You wouldn't note them at the end of the article to later have the
>difficulty to remember at which part of the article you refer to.
>
>  
>
>>taken from this website  
>>http://www.penguinsecurity.net/pensec/modules.php?name=News&file=article&sid=256
>>
>>The goal of using Identity/Pubkey authentication is to remove the need 
>>for static passwords. Instead of providing a password, which could be 
>>captured by a keystroke logger or witnessed as you type it, you have a 
>>key pair on your disk that you use to authenticate. Your account on the 
>>SSH server has a list of Identities/Pubkeys that it trusts, and if you 
>>can prove you have the public and private key then you are granted 
>>access without supplying a password.
>>    
>>
>
>That is correct.
>
>  
>
>>Some of the nice features of this form of authentication are:
>>
>>    * No one can shoulder-surf your password and log in to your accounts
>>      - they'd need both your Identity passphrase and the private key
>>      from your machine.
>>    
>>
>
>You see here the mention of the "passphrase"? Sure you do.
>
>  
>
>>    * The server administrator could disable password authentication
>>      entirely, to prevent password guessing attacks.
>>    
>>
>
>That improves security.
>
>  
>
>>    * You can use the |ssh-agent| and SSH agent forwarding to have your
>>      authentication credentials 'follow' you.
>>    
>>
>
>That's what I said: use ssh-agent.
>
>  
>
>>    * You can place restrictions on Identities/Pubkeys, for example
>>      forbidding port forwards, forcing predetermined commands,
>>      regardless of what the user wanted to run, and more.
>>    
>>
>
>Another option to improve security.
>
>  
>
>>In this week's article we'll show how you create keys and configure your 
>>account to allow them to log in. In later articles we'll go into some of 
>>the other capabilities of SSH identities.
>>
>>Am I misunderstanding this article?  I would like to run rsync jobs via 
>>cron, and not require a password
>>    
>>
>
>I think you are understanding the article. I just want to point out:
>password != passphrase. While a password is typically something like
>"Zv86&rq_f$v", a passphrase means typically a senseless sentence. The
>passphrase protects the pubkey, so that if someone gets the public key
>into his hands he can not simply use it without knowing the nifty
>sentence.
>
>Now about your rsync cronjob "problem". As cron has a very limited
>environment it will not make use of ssh-agent. To avoid the situation to
>use a passphrase-less pubkey auth you should use (that is my
>recommendation) keychain. It is a great tool, a wrapper script above
>ssh-agent and makes it possible to run cronjobs with ssh pubkey
>authentication using passphrase protected keys.
>
>http://www.gentoo.org/proj/en/keychain/index.xml
>
>Ready to install & use RPM:
>
>http://dev.gentoo.org/~agriffis/keychain/
>
>I myself have following code in the ~/.bashrc of my backup user (and of
>users where I make use of it too):
>
># start keychain and point it to the private keys
># that we'd like it to cache
>KEY="`ls ${HOME}/.ssh/*dsa`"
>/usr/bin/keychain ${KEY}
>if [ -f ${HOME}/.keychain/${HOSTNAME}-sh ]; then
>        . ${HOME}/.keychain/${HOSTNAME}-sh > /dev/null
>else
>        echo "there is a problem with keychain"
>fi
>
>You just have to login as the keychain using user to make the credential
>available for cron tasks.
>
>A user crontab looks like this:
>
>15 4,12,20 * * * source /home/backup/.keychain/serendipity.dogma.lan-sh
>  
>
>>/dev/null && /home/backup/rdiff-script.blacky.pl
>>    
>>
>
>[ that is a single line ]
>
>I am not using rsync for backup purposes, but rdiff-backup which is
>available through Fedora Extras. Gavin Henry once wrote a nice article
>about using it:
>
>http://fedoranews.org/ghenry/rdiff/
>
>I use it in reverse order, means backup running on client host
>connecting the server which holds the data to save.
>
>  
>
>>Michael Yep
>>    
>>
>
>Alexander
> 
>
>  
>
Ok, just to make sure I understand, basically PublicKey auth still uses 
a password,
but it is better because you need 2 things, what you have (the 
certificate), and what you know (the password)


-- 
Michael Yep
Development / Technical Operations
RemoteLink, Inc.
(630) 983-0072 x164 




More information about the fedora-list mailing list