Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature Request] - Support for Encrypted Private Keys #108

Open
n8rade opened this issue Sep 26, 2020 · 1 comment
Open

[Feature Request] - Support for Encrypted Private Keys #108

n8rade opened this issue Sep 26, 2020 · 1 comment

Comments

@n8rade
Copy link

n8rade commented Sep 26, 2020

Request to support encrypted private keys. Current behavior is to ask for a password and then send you back to the hosts menu. Seems that the password is not used to decrypt the private key.

Checking the logs and I see this:
2020-09-26 16:58:18,022 - ERROR - Core: Invalid Private Key for user user : private key file is encrypted
2020-09-26 16:58:21,792 - INFO - Connected (version 2.0, client OpenSSH_7.4)
2020-09-26 16:58:21,889 - ERROR - SSHClient:: error authenticating :
2020-09-26 16:58:21,889 - INFO - Core: Finished session UUID for user user to host hostname
2020-09-26 16:58:22,004 - ERROR - Sniffer: close session files error coercing to Unicode: need string or buffer, NoneType found

I can confirm that the key works otherwise in a normal shell from the same user to the same host.

[user@aker ~]$ ssh user@hostname
Enter passphrase for key '/home/user/.ssh/id_rsa':
Last login: Sat Sep 26 16:57:50 2020 from aker.FQDN
[user@target-host ~]$

@n8rade
Copy link
Author

n8rade commented Sep 27, 2020

I also tried this with a pem formatted and encrypted private key and it did not make a difference.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant