I want to write an SSH agent that knows what user/host you're trying to connect to, but the protocol doesn't provide that. So I just had a ridiculous idea. What if I make a FUSE filesystem that materializes listening UNIX sockets on the fly, and set IdentityAgent to <fs>/%r@%h
-
-
Replying to @marcan42
Does SSH open the connection before it does the agent request? You could potentially get SO_PEERCRED and netstat the connection endpoint
But that wouldn't allow nice handling of proxies or good jailing of the agent.1 reply 0 retweets 0 likes -
Replying to @viraptor
My previous idea was to ProxyCommand something they told the agent what you're connecting to, but that has race condition issues with multiple connections
1 reply 0 retweets 1 like -
I was going to recommend something like that. Does IdentitiesOnly and IdentityFile change your need at all?
1 reply 0 retweets 0 likes -
Replying to @DrScriptt @viraptor
The client does not actually hold the private key, so I have to use agent mode. The goal is to have an agent server give you access to the key you need, but it needs to know what you're trying to connect to.
1 reply 0 retweets 0 likes -
So, centrally managed keys that you’re trying to interface with like a (forwarded) agent? Thus the “”agent needs to know what key you need so that it can provide it to you?
1 reply 0 retweets 0 likes -
Replying to @DrScriptt @viraptor
Correct. It's a design for a central authentication system that does not require deeply integrated target hosts (no LDAP/cert system/uniform key management) and can provide auditing (no just shoving people's personal private keys into all authorized_keys files).
1 reply 0 retweets 0 likes -
ACK I question the viability of the audit. You can know when I request a given key. But you have now way to know if I keep a copy.
Check out SSH certs. You can expire them, or specify which command they can be used with.1 reply 0 retweets 0 likes -
Replying to @DrScriptt @viraptor
That is not how SSH agents work. You do not request the key, you request to sign something with it. Every single use has to go through the agent. That's the entire point!
2 replies 0 retweets 0 likes -
Okay. I’ve not delved into key / agent operations. Do check out SSH certs.
1 reply 0 retweets 0 likes
Certs are great when you have a well-integrated homogeneous infrastructure, but require significant configuration on both sides. I want something that can work on the basic premise of "stick a key into your authorized_keys" that we're all familiar with for ad-hoc SSH.
-
-
ACK
0 replies 0 retweets 0 likesThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.