Re: [EXTERNAL] Re: Signed SSH keys do not handle port forwarding correctly

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



On 07/05/2021 08:27, Rory Campbell-Lange wrote:
On 07/05/21, Kadel-Garcia, Nico (nico.kadel-garcia@xxxxxxxxxxx) wrote:
Oh, yes, it's Hashicorp Vault. It's been a very long day.

I enabled the "permit-port-forwardig" option in the ssh-client-signer role, and it did not help.
You may want to set the receiving sshd LogLevel to VERBOSE to help find out what the problem is.

Also, inspect the certificate with ssh-keygen -Lf <file>, just to be sure the desired extension is in there. e.g.

$ ssh-keygen -Lf test.cert
test.cert:
        Type: ssh-rsa-cert-v01@xxxxxxxxxxx user certificate
        Public key: RSA-CERT SHA256:mVV81....
        Signing CA: RSA SHA256:nqMqs.... (using rsa-sha2-256)
        Key ID: "vault-root-99557c...."
        Serial: 10087169145372651617
        Valid: from 2021-02-22T14:47:42 to 2021-02-23T02:48:12
        Principals:
                test
        Critical Options: (none)
*        Extensions:**
**                permit-pty*

Note that if you put permit-port-forwarding in "allowed_extensions" and/or "default_extensions" in the signing role, but the client specifically requests a set of extensions that doesn't include permit-port-forwarding, then the certificate won't include it.


_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev




[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux