Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Automatic public key authentication setup #4405

Open
cyberduck opened this issue Apr 16, 2010 · 3 comments
Open

Automatic public key authentication setup #4405

cyberduck opened this issue Apr 16, 2010 · 3 comments
Assignees
Labels
enhancement low priority sftp SFTP Protocol Implementation

Comments

@cyberduck
Copy link
Collaborator

4dfeb0a created the issue

If you choose the option to "Use Public Key Authentication", it would be nice, if the public key authentication failed, if CyberDuck would give you the option to enter a valid user/password and cat my public key to the bottom of the authorized_keys and reconnect.

@cyberduck
Copy link
Collaborator Author

@dkocher commented

The login prompt should be shown again if the public key authentication fails. I don't see the issue with authorized_keys; it is OpenSSH server writing entries in there.

@cyberduck
Copy link
Collaborator Author

@dkocher commented

Quoting [4405 dan@…]:

If you've never connected to a host using public key auth before, but would like all future connections to use it. You should be able to enable public key auth, point cyberduck to the priv/public keys. When you make your first connection you would be prompted for your username and password and upon successful auth then cyberduck would append your public key to the authorized_keys and reconnect using public key auth. This saves the user all the headache of doing this themselves manually. iSSH for the iPhone/iPad has similar functionality with a Transfer Public Key button.

For now, the user has to manually configure this. Refer to How to configure public key authentication.

@cyberduck
Copy link
Collaborator Author

@dkocher commented

Like ssh-copy-id.

DESCRIPTION
     ssh-copy-id is a script that uses ssh(1) to log into a remote machine (presumably using a login pass‐
     word, so password authentication should be enabled, unless you've done some clever use of multiple
     identities).  It assembles a list of one or more fingerprints (as described below) and tries to log in
     with each key, to see if any of them are already installed (of course, if you are not using
     ssh-agent(1) this may result in you being repeatedly prompted for pass-phrases).  It then assembles a
     list of those that failed to log in, and using ssh, enables logins with those keys on the remote
     server.  By default it adds the keys by appending them to the remote user's ~/.ssh/authorized_keys
     (creating the file, and directory, if necessary).  It is also capable of detecting if the remote system
     is a NetScreen, and using its ‘set ssh pka-dsa key ...’ command instead.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement low priority sftp SFTP Protocol Implementation
Projects
None yet
Development

No branches or pull requests

2 participants