I want to write an SSH agent that knows what user/host you're trying to connect to, but the protocol doesn't provide that. So I just had a ridiculous idea. What if I make a FUSE filesystem that materializes listening UNIX sockets on the fly, and set IdentityAgent to <fs>/%r@%h
-
-
Replying to @marcan42
Does SSH open the connection before it does the agent request? You could potentially get SO_PEERCRED and netstat the connection endpoint
But that wouldn't allow nice handling of proxies or good jailing of the agent.1 reply 0 retweets 0 likes -
Replying to @viraptor
My previous idea was to ProxyCommand something they told the agent what you're connecting to, but that has race condition issues with multiple connections
1 reply 0 retweets 1 like -
I was going to recommend something like that. Does IdentitiesOnly and IdentityFile change your need at all?
1 reply 0 retweets 0 likes -
Replying to @DrScriptt @viraptor
The client does not actually hold the private key, so I have to use agent mode. The goal is to have an agent server give you access to the key you need, but it needs to know what you're trying to connect to.
1 reply 0 retweets 0 likes -
So, centrally managed keys that you’re trying to interface with like a (forwarded) agent? Thus the “”agent needs to know what key you need so that it can provide it to you?
1 reply 0 retweets 0 likes -
Replying to @DrScriptt @viraptor
Correct. It's a design for a central authentication system that does not require deeply integrated target hosts (no LDAP/cert system/uniform key management) and can provide auditing (no just shoving people's personal private keys into all authorized_keys files).
1 reply 0 retweets 0 likes -
ACK I question the viability of the audit. You can know when I request a given key. But you have now way to know if I keep a copy.
Check out SSH certs. You can expire them, or specify which command they can be used with.1 reply 0 retweets 0 likes -
Replying to @DrScriptt @viraptor
That is not how SSH agents work. You do not request the key, you request to sign something with it. Every single use has to go through the agent. That's the entire point!
2 replies 0 retweets 0 likes
And since the idea is that each server gets a unique key, there's no possibility of requesting a key for one server and using it with another one.
-
-
Did you find any good solution for this? I saw your email about using an extension in the agent protocol
0 replies 0 retweets 0 likesThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.