Hello Guest, if you are reading this it means you have not registered yet. Please take a second, Click here to register, and in a few simple steps you will be able to enjoy our community and use our OpenViX support section.
Results 1 to 15 of 21

Thread: Engima2 enable ssh key access only

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1

    Title
    Senior Member
    Join Date
    Dec 2012
    Posts
    188
    Thanks
    126
    Thanked 37 Times in 21 Posts
    [QUOTE=birdman;447025]
    Quote Originally Posted by Alankellyeire View Post
    Im converting my rsa public key(id.rsa.pub) after transferring it to the vix box using scp. i then run dropbearconvert but get an error
    Code:
    Error: File does not begin with OpenSSH key header
    Error reading key from '/home/root/.ssh/id_dsa.pub'
    It needs to be the private key. This is what happens with my pub/priv keys.

    Code:
    root@et8000:~# dropbearconvert openssh dropbear id_rsa.pub db.rsa
    Error: File does not begin with OpenSSH key header
    Error reading key from 'id_rsa.pub'
    root@et8000:~# dropbearconvert openssh dropbear id_rsa db.rsa
    Key is a ssh-rsa key
    Wrote key to 'db.rsa'
    However - while checking this it occurred to me that this is the host key. the one that a client can check to ensure it's reached the right host (or at least the same host as last time). It's specific to the host, so no point in generating it from your own key (although it does help to back it up so that it remains the same over any re-flash).

    So in fact I can't see anywhere that the box saves keys for checking. Indeed - I can slogin to root from an account that knows nothing about any ssh keys at all.

    A debug log when I login contains this:
    Code:
    debug1: SSH2_MSG_SERVICE_ACCEPT received
    debug1: Authentication succeeded (none).
    Authenticated to et8000 ([192.168.1.154]:22).
    debug1: channel 0: new [client-session]
    debug1: Entering interactive session.
    debug1: pledge: network
    debug1: Sending environment.
    Sorry about the misleading info.
    Yes I have tried it with the private key and it writes it to the file but any guide I am coming across say it should be the public key. Ok so just to be clear your saying it's not possible at all because dropbear doesn't generate a key? Maybe this is why I'm finding it so hard to find any guides on the matter.

  2. #2
    birdman's Avatar
    Title
    Moderator
    Join Date
    Sep 2014
    Location
    Hitchin, UK
    Posts
    7,821
    Thanks
    237
    Thanked 1,659 Times in 1,307 Posts
    Quote Originally Posted by Alankellyeire View Post
    Ok so just to be clear your saying it's not possible at all because dropbear doesn't generate a key? Maybe this is why I'm finding it so hard to find any guides on the matter.
    There are multiple keys involved in an ssh connexion.

    • The host key, which let's you know you are connecting the same host as last time. This gets saved (well, a signature does) in your local known_hosts file (at least on Unix/Linux). This is what the /etc/dropbear/dropbear_rsa_host_key key is.
    • Authentication keys. This is where you'd have the private key on the client side to be checked against the public key on the server side. These would be under ~/.ssh. These don't seem to be used at all.
    MiracleBox Prem Twin HD - 2@DVB-T2 + Xtrend et8000 - 5(incl. 2 different USBs)@DVB-T2[terrestrial - UK Freeview HD, Sandy Heath] - LAN/USB-stick/HDD

  3. The Following User Says Thank You to birdman For This Useful Post:

    Alankellyeire (20-04-17)

  4. #3

    Title
    Senior Member
    Join Date
    Dec 2012
    Posts
    188
    Thanks
    126
    Thanked 37 Times in 21 Posts
    Quote Originally Posted by birdman View Post
    There are multiple keys involved in an ssh connexion.

    • The host key, which let's you know you are connecting the same host as last time. This gets saved (well, a signature does) in your local known_hosts file (at least on Unix/Linux). This is what the /etc/dropbear/dropbear_rsa_host_key key is.
    • Authentication keys. This is where you'd have the private key on the client side to be checked against the public key on the server side. These would be under ~/.ssh. These don't seem to be used at all.
    Thanks. I'll look into installing openssh or something like it so.

    I appreciate the help.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
This website uses cookies
We use cookies to store session information to facilitate remembering your login information, to allow you to save website preferences, to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners.