User Tools

Site Tools



Remained Logged in Via SSH

Sometimes connections drop between servers when ssh'd in. Skynet is an example of this. Add these lines to .ssh/config

Host * ServerAliveInterval 120 ServerAliveCountMax 3

ssh host based authentication

This allows people logged into Server A automatically log into Server B without a password *or* sshkeys. Auth is via the Servers. Here is the main how-to: I hope diamond wont mind, but I'll copy his how-to here for archive purposes.

What i wanted to do was allow any users on host A be able to ssh to host B using ssh v2 and be automatically logged in. So, these are the steps i took:

Step by Step

  • On A, i added the following to /etc/ssh/ssh_config:

Host *

 EnableSSHKeysign yes


 HostbasedAuthentication yes
* On B, i set the following config options in /etc/ssh/sshd_config:

IgnoreRhosts yes HostbasedAuthentication yes //Remember to reload the sshd config after editing

  • On B, i added the fqdn of A to /etc/ssh/shosts.equiv:

  • On B, i used the following to add the public RSA key of A to ssh_known_hosts:

ssh-keyscan -vt dsa » /etc/ssh/ssh_known_hosts

Note: the fqdn of A used above has to be the same as the result of a reverse dns lookup on it’s IP.

Further Tweak

To add a piece to the above how-to: There was a discrepancy between dsa and rsa keys IMO. Although going via ssh would login fine without prompting to accept a key, in order to get pine to autologin, a rsa key had to be added. On host A: ssh-keyscan -vt rsa » /etc/ssh/ssh_known_hosts That worked it -)

Regenerate System SSH Keys

After the recent debian issue with openssl, all ssh keys had to be regenerated. Here is the easies method for doing the system ssh keys: rm /etc/ssh/ssh_host_* dpkg-reconfigure openssh-server

Information got from:

ssh.txt · Last modified: 2022/07/19 21:13 by