Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Configuration to restrict SSH access #47

Merged
merged 4 commits into from
May 24, 2023
Merged

Conversation

robherley
Copy link
Owner

A solution for:

It adds a new configuration variable, SNIPS_SSH_AUTHORIZEDKEYSPATH to point to an authorized_keys-like file that will restrict SSH access to the public keys defined in that file. If the envvar is not set, it will behave normally. This is opt-in and will not change default behavior.

@tigh-latte
Copy link
Contributor

Should we consider having the auth keys config option be a URI instead of a path?

Just so that the program isn't locked into supporting on-device only config options, and instead can just be pointed to file:///home/me/.ssh/authorized_keys or https://github.com/tigh-latte.keys?

@robherley
Copy link
Owner Author

Should we consider having the auth keys config option be a URI instead of a path?

I'd prefer to keep it on disk, much simpler vs. running a download on start.

I imagine a common use case would be to just point it to an authorized_keys file already existing on a host e.g. ~/.ssh/authorized_keys

@robherley robherley merged commit 1554007 into main May 24, 2023
@robherley robherley deleted the robherley/limit-ssh-access branch May 24, 2023 01:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants