-
Hey there, Trying to get step-ca set up in my home environment for cert-based ssh authentication to my VMs. I'm following the instructions on the second half of this page: https://smallstep.com/docs/step-ca/basic-certificate-authority-operations. I can successfully login as a user to my host after setting TrustedUserCAKeys. I run into issues however when I try to add HostKey and HostCertificate. I'm seeing the following errors in sshd. I'm sure I'm doing something silly incorrectly, but I've been at this for a bit now and seem to be following the instructions properly. The logs do present a question, how would sshd know about the passphrase for the private key? Would this be via ssh-agent? For reference, this is on a Debian 10 box. The actual CA is running on another VM, and seems to be working okay. Just having issues with the host certs. Thanks. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 3 replies
-
Default ssh keys doesn't have a passphrase, I'm not sure if sshd supports it, at least directly, I haven't find any option after a quick look to My recommendation is to remove the password from those keys, or sign a new key without a password. One way to do it is to sign an existing sshd public key:
And to generate one without a password:
|
Beta Was this translation helpful? Give feedback.
Default ssh keys doesn't have a passphrase, I'm not sure if sshd supports it, at least directly, I haven't find any option after a quick look to
man sshd_config
. An agent can be used, to hold those keys, but it's not the most common scenario.My recommendation is to remove the password from those keys, or sign a new key without a password. One way to do it is to sign an existing sshd public key:
And to generate one without a password: