-
Notifications
You must be signed in to change notification settings - Fork 105
Optional passthrase when using SSH key in UI #472
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
If we are doing this for security, then I think SSH2 supports using an SSH agent (e.g. Pagent), which is definitely better than storing the credentials in our extension (even with secure storage). Maybe we should steer people to use that and possibly drop support for storing credentials at all? Best practice would be to store the SSH Keys in an Agent, and have the extension retreive them from said agent as required. User/password logins should never be used, and keyboard interactive logins should definitely be turned off!! Here is some 10 year old security advice for your delectation! https://www.youtube.com/watch?v=_i7v7Of5UPI |
@priceaj The chances of us dropping credentials right now are very low - I think if we did that, we'd need to add a way to make it easy to generate SSH keys and get them uploaded to IBM i automatically ( I think what we should do in the meantime, is absolutely warn the user when they log in with a password.
Then the yes button could generate a key, upload it to the system, update their connection settings to point to the key, and then disconnect. What do you think of that? Also, the original issue here is when using an SSH key + passphrase. Perhaps the passphrase could be a quick popup box where the user needs to enter it in every time they connect like they would when they connect thru a terminal. |
Would be good to give the user the option to set up a key if they're using password to login. Using an agent would mitigate the need for password prompt, but yes if the key isn't found in agent, a one time entry would be appropriate. |
Just an idea here - I've started using ssh certificates (with a passphrase on my CA) instead of a passphrase on my actual ssh key and signing it at login for every day with a limited validity period. This has been much more reliable for me vs using ssh agents. It would be nice if I could use that certificate with this plugin. I might look into adding this myself when I get a chance and submitting a PR. |
Nevermind about the certificates, the upstream packages don't appear to support them... see mscdex/ssh2#551 |
In discussion with Liam:
|
Needed as a new connection prop
The text was updated successfully, but these errors were encountered: