From Wiki

Jump to: navigation, search


Remained Logged in Via SSH

Sometimes connections drop between servers when ssh'd in. Skynet is an example of this. Add these lines to .ssh/config

Host *
ServerAliveInterval 120
ServerAliveCountMax 3 

ssh host based authentication

This allows people logged into Server A automatically log into Server B without a password *or* sshkeys. Auth is via the Servers. Here is the main how-to: I hope diamond wont mind, but I'll copy his how-to here for archive purposes.

What i wanted to do was allow any users on host A be able to ssh to host B using ssh v2 and be automatically logged in. So, these are the steps i took:

Step by Step

  • On A, i added the following to /etc/ssh/ssh_config:
Host *
  EnableSSHKeysign yes
  HostbasedAuthentication yes
  • On B, i set the following config options in /etc/ssh/sshd_config:
IgnoreRhosts yes
HostbasedAuthentication yes
//Remember to reload the sshd config after editing 
  • On B, i added the fqdn of A to /etc/ssh/shosts.equiv:
  • On B, i used the following to add the public RSA key of A to ssh_known_hosts:
ssh-keyscan -vt dsa >> /etc/ssh/ssh_known_hosts

Note: the fqdn of A used above has to be the same as the result of a reverse dns lookup on it’s IP.

Further Tweak

To add a piece to the above how-to: There was a discrepancy between dsa and rsa keys IMO. Although going via ssh would login fine without prompting to accept a key, in order to get pine to autologin, a rsa key had to be added.

On host A:
ssh-keyscan -vt rsa >> /etc/ssh/ssh_known_hosts

That worked it -)

Regenerate System SSH Keys

After the recent debian issue with openssl, all ssh keys had to be regenerated. Here is the easies method for doing the system ssh keys:

rm /etc/ssh/ssh_host_*
dpkg-reconfigure openssh-server

Information got from:

Personal tools