Skip to content

Added a pair of flags to handle agent-assisted key-based authentication in SSH#30

Open
EnSec4Git wants to merge 1 commit intomicrosoft:mainfrom
EnSec4Git:feature/ssh_key_auth
Open

Added a pair of flags to handle agent-assisted key-based authentication in SSH#30
EnSec4Git wants to merge 1 commit intomicrosoft:mainfrom
EnSec4Git:feature/ssh_key_auth

Conversation

@EnSec4Git
Copy link

This PR tries to allow usage of SSH agents for improved security (by removing passwords from the equation) in the SSH handshake process. This also mitigates a related issue, namely the blind trust of the router's SSH fingerprint (enabled by this line - ssh_client.set_missing_host_key_policy(paramiko.AutoAddPolicy())): When using keys, there is very little even an active network attacker can do.

There is one additional flag added that I found necessary when working with Mikrotik routers - failure to negotiate a viable handshake algorithm, as described here: https://forum.mikrotik.com/viewtopic.php?t=157598. I can attest to experiencing this issue firsthand, hence the added flag.

This PR can also provide partial support for the larger feature of SSH key authentication support, as reported here - #25

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants