-
Notifications
You must be signed in to change notification settings - Fork 32
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Restrict usage to authorized keys #10
Comments
I eventually also added support for openssh certificates. Extensions can be added in the certificate so the default route can be managed from here. |
Hi @Oaz Very nice - these seem like some handy additions - have you thought about how such authentication should be configured? At the moment, remotemoe goes clear of any configuration other than runtime state - For example, if you added a custom hostname using key X, then other keys cannot take it over, and so on. I would prefer not to introduce a configuration file. As such, the default behavior must be predictable for the administrators, especially considering this could have an unexpected security impact. |
Hi @fasmide I'm not sure I get the "no config file" rationale. The proposed features are equivalent to the AuthorizedKeysFile and TrustedUserCAKeys entries in sshd_config. So, strictly speaking, there is no configuration file but only a keys file referenced through an environment variable. Note : on my own remotemoe server, I just added an "EnvironmentFile" entry in the remotemoe.service to define the AUTHORIZED_KEYS_FILE environment variable. |
Hello,
I wanted to restrict the use of the service so that any random public key cannot be used.
I was not able to find any way of doing this so I implemented an "authorized keys" check in the pubkey callback.
The text was updated successfully, but these errors were encountered: