Skip to content

Commit c647279

Browse files
authored
Merge pull request #530 from iterate-ch/issue/528
Document SSH user certificate authentication
2 parents 2da52a3 + f8bf640 commit c647279

File tree

2 files changed

+19
-7
lines changed

2 files changed

+19
-7
lines changed

.gitignore

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1,5 @@
1-
_build/
1+
_build/
2+
bin
3+
lib
4+
lib64
5+
pyvenv.cfg

protocols/sftp/index.md

Lines changed: 14 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -96,7 +96,7 @@ PuTTY private keys (`.ppk`) are supported for `rsa` key types. `ed25519` is not
9696

9797
#### OpenSSH Key Format Interoperability
9898

99-
OpenSSH private keys of type `rsa`, `dsa`, `ecdsa` and `ed25519` (in OpenSSL`PEM` format) are supported. The new OpenSSH format (`openssh-key-v1`) is only supported for `ecdsa` and `ed25519`.
99+
OpenSSH private keys of type `rsa`, `dsa`, `ecdsa` and `ed25519` (in OpenSSL `PEM` format) are supported. The new OpenSSH format (`openssh-key-v1`) is only supported for `ecdsa` and `ed25519`.
100100

101101
#### Configure Public Key Authentication
102102

@@ -110,10 +110,14 @@ OpenSSH private keys of type `rsa`, `dsa`, `ecdsa` and `ed25519` (in OpenSSL`PEM
110110
```
111111
3. In the Connection Dialog or the Bookmark editor in Cyberduck select *Use Public Key Authentication* and select the private key in your `.ssh` directory.
112112

113+
##### OpenSSH User Certificate Authentication
113114

114-
#### CA signed SSH Certificate Interoperability
115+
```{important}
116+
* Cyberduck [8.9.0](https://cyberduck.io/changelog/) or later required
117+
* Mountain Duck [4.16.0](https://mountainduck.io/changelog/) or later required
118+
```
115119

116-
*Certification Authority (CA)* sigend SSH certificates are supported for keys of type `rsa`, `dsa`, `ecdsa`, and `ed25519`.
120+
Applies to SSH servers, which are configured with [`TrustedUserCAKeys`](https://man.openbsd.org/sshd_config#TrustedUserCAKeys), refer to your software vendor for configuration. To configure authentication with a User CA signed private key, configure the private key as described in [Configure Public Key Authentication](#configure-public-key-authentication) step 3. The signed public key file _must_ reside next to the private key file, suffixed `-cert.pub` or `.pub`. The [`CertificateFile`](https://man.openbsd.org/ssh_config#CertificateFile) configuration directive in `~/.ssh/config` is not supported. Pay attention to the server configuration and [`PubkeyAcceptedAlgorithms`](https://man.openbsd.org/sshd_config#PubkeyAcceptedAlgorithms) specifically which determines the allowed private key algorithms to authenticate with.
117121

118122
#### Public Key Authentication Using SSH Agent
119123
When connecting to a SSH server, Cyberduck will lookup matching private keys from the SSH agent when attempting to authenticate with the server if no password is available and no explicit private key to use is configured in the bookmark.
@@ -329,17 +333,21 @@ You can set Cyberduck or a third-party application as the default application (p
329333

330334
`diffie-hellman-group1-sha1`, `diffie-hellman-group14-sha1`, `diffie-hellman-group14-sha256`, `diffie-hellman-group15-sha512`, `diffie-hellman-group16-sha512`, `diffie-hellman-group17-sha512`, `diffie-hellman-group18-sha512 diffie-hellman-group-exchange-sha1`, `diffie-hellman-group-exchange-sha256`, `ecdh-sha2-nistp256`, `ecdh-sha2-nistp384`, `ecdh-sha2-nistp521`, `[email protected]`
331335

332-
### Signatures
336+
### SSH Key Types
337+
338+
`ssh-rsa`, `ssh-dss`, `ecdsa-sha2-nistp256`, `ecdsa-sha2-nistp384`, `ecdsa-sha2-nistp521`, `ssh-ed25519`, `rsa-sha2-256`, `rsa-sha2-512`
339+
340+
### SSH Certificate Key Types
333341

334-
`ssh-rsa`, `ssh-dss`, `ecdsa-sha2-nistp256`, `ecdsa-sha2-nistp384`, `ecdsa-sha2-nistp521`, `ssh-ed25519`
342+
`ssh-rsa[email protected]`, `ssh-dss[email protected]`, `ecdsa-sha2-nistp256[email protected]`, `ecdsa-sha2-nistp384[email protected]`, `ecdsa-sha2-nistp521[email protected]`, `ssh-ed25519[email protected]`
335343

336344
### Compression
337345

338346
Compression with `zlib` and `[email protected]` is supported.
339347

340348
### Private Key Files
341349

342-
`pkcs5`, `pkcs8`, `openssh-key-v1`, `[email protected]`, `[email protected]`
350+
`pkcs5`, `pkcs8`, `openssh-key-v1`
343351

344352
## Incompatibilities
345353

0 commit comments

Comments
 (0)