Jump to content

Ssh Key Problem


ParMan

Recommended Posts

i have been having this problem with backtrack ever since i installed r2 when ever i try to start ssh i get the errors.

Could not load host key: /etc/ssh/ssh_host_rsa_key
Could not load host key: /etc/ssh/ssh_host_dsa_key

i ran these commands to get the keys:

ssh-keygen -t dsa -f /etc/ssh/ssh_host_dsa_key
ssh-keygen -t rsa -f /etc/ssh/ssh_host_rsa_key

i am getting these errors on both my laptop running wireless (internet working fine), and a virtual machine (internet works here too).

just dont know whats causing it not to work thanks for all your help.

Link to comment
Share on other sites

-rw------ l root root 736 Jan 4 15:52 /etc/ssh/ssh_host_dsa_key

-rw------ l root root 1743 Jan 4 15:52 /etc/ssh/ssh_host_rsa_key

so i dont think so.

so i changed them to -rw-rw-r and i got this

96dua0.jpg

Edited by ParMan
Link to comment
Share on other sites

no i didnt but i can.

so i changed them and service started fine. whats up with that?

When starting up the service didn't know what the passphrase was for your keys, so it couldn't decrypt them to use them.

Link to comment
Share on other sites

Host keys identify the system you are connecting to for testing for a MITM or spoofing of the server and do not require a passphrase by design as mentioned above, systems would not start non-interactively without potentially exposing the passphrase programmatically. SSH user keys (pub/priv keys) are used to verify the identify of the user and can be considered multifactor authentication when using a passphrase (something you have and something you know). Much bettwe security that way, but I have seen lazy admins using only pki for authentication so they do not have to type a password and many admins/devs that use pki without passphrases for automated system authentication (hopefully with very limited access).

Link to comment
Share on other sites

Many admins/devs that use pki without passphrases for automated system authentication (hopefully with very limited access).

scponly is a great little program that can help with this sort of setup. It lets you limit a user to only doing file transfers rather than letting them also get a shell on the machine. You should probably run it in a chroot environment to really limit what files they can access.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...