Differences

This shows you the differences between the selected revisions of the page.

2018-02-11 2018-02-12
no summary (pingo-power) (untrusted) allowing command to work when executed from powershell shell + removing nonsense comment about using a host key as an authentication private key. (martin)
Line 8: Line 8:
  * Extract the package to ''C:\Program Files\OpenSSH''   * Extract the package to ''C:\Program Files\OpenSSH''
  * As the Administrator, install SSHD and ssh-agent services: \\ ''powershell.exe -ExecutionPolicy Bypass -File install-sshd.ps1''   * As the Administrator, install SSHD and ssh-agent services: \\ ''powershell.exe -ExecutionPolicy Bypass -File install-sshd.ps1''
-  * As the Administrator, generate server keys and restrict an access to them, by running the following commands from the ''C:\Program Files\OpenSSH'' directory: \\ ''.\ssh-keygen.exe -A'' \\ ''%%powershell.exe -ExecutionPolicy Bypass -Command ". .\FixHostFilePermissions.ps1 -Confirm:$false%%"'' (if it return an error, erase ''-Confirm:$false'' and manually say yes to all requests)+  * As the Administrator, generate server keys and restrict an access to them, by running the following commands from the ''C:\Program Files\OpenSSH'' directory: \\ ''.\ssh-keygen.exe -A'' \\ ''%%powershell.exe -ExecutionPolicy Bypass -Command ". .\FixHostFilePermissions.ps1 -Confirm:$false%%"'' \\ (when using Windows PowerShell instead of Command Prompt, use single quotes around ''-Command'' switch value)
  * Allow incoming connections to %%SSH%% server in Windows Firewall:   * Allow incoming connections to %%SSH%% server in Windows Firewall:
    * Either run the following PowerShell command (Windows 8 and 2012 or newer only), &win8 &win2012 as the Administrator: \\ ''%%New-NetFirewallRule -Name sshd -DisplayName 'OpenSSH Server (sshd)' -Service sshd -Enabled True -Direction Inbound -Protocol TCP -Action Allow%%''     * Either run the following PowerShell command (Windows 8 and 2012 or newer only), &win8 &win2012 as the Administrator: \\ ''%%New-NetFirewallRule -Name sshd -DisplayName 'OpenSSH Server (sshd)' -Service sshd -Enabled True -Direction Inbound -Protocol TCP -Action Allow%%''
Line 28: Line 28:
===== [[connecting]] Connecting to the server ===== ===== [[connecting]] Connecting to the server =====
-Before the first connection, find out fingerprint of the server's ED25519 key by running ''ssh-keygen.exe -l -f ssh_host_ed25519_key -E md5'' from the ''C:\Program Files\OpenSSH'' (if it return an error ''No such file or directory'',simply write ''.\ssh-keygen.exe'' and name the file ''ssh_host_ed25519_key'' with no passphrase. Then execute the original command writed upper):+Before the first connection, find out fingerprint of the server's ED25519 key by running ''.\ssh-keygen.exe -l -f ssh_host_ed25519_key -E md5'' from the ''C:\Program Files\OpenSSH'':
<code> <code>
-C:\Program Files\OpenSSH>ssh-keygen.exe -l -f ssh_host_ed25519_key -E md5+C:\Program Files\OpenSSH>.\ssh-keygen.exe -l -f ssh_host_ed25519_key -E md5
256 MD5:0d:df:0a:db:b4:e9:f1:08:d5:59:2b:91:8e:08:1c:78 martin@example (ED25519) 256 MD5:0d:df:0a:db:b4:e9:f1:08:d5:59:2b:91:8e:08:1c:78 martin@example (ED25519)
</code> </code>
Line 42: Line 42:
  * For a public key authentication:   * For a public key authentication:
    * Press the //Advanced// button to open [[ui_login_advanced|Advanced site settings dialog]] and go to //[[ui_login_authentication|SSH > Authentication page]]//.     * Press the //Advanced// button to open [[ui_login_advanced|Advanced site settings dialog]] and go to //[[ui_login_authentication|SSH > Authentication page]]//.
-    * In //Private key file// box select your private key file (if you cannot see your key, select ''All files'' right to the box ''Name of file'', then select ''ssh_host_ed25519_key'').+    * In //Private key file// box select your private key file.
    * Submit Advanced site settings dialog with the //OK// button.     * Submit Advanced site settings dialog with the //OK// button.
  * For a password authentication:   * For a password authentication:

Last modified: by martin – Currently locked by: 172.255.82.42