-
Notifications
You must be signed in to change notification settings - Fork 208
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ProxyJump with another keyfile #1930
Comments
Hello Laurenz, Thank you for taking the time to report the bug and providing the details. I appreciate your feedback. I am not sure if I get this correct. I never explicit specified key files myself. BIT runs on hostA, over hostB (the jump host), into hostC (the backup destination). I even wonder why BIT need to manage the key-file for hostC. Should hostB manage the key-file for hostC? Is your use case a rare case? I don't want to make the GUI more complex at all. But I also don't say "no". If you have any more details to share, feel free to reach out. Not sure when we'll find the time to work on it. Please see the projects background information to get an idea about our workflow and priorities: Best regards, |
I think the use case is indeed a niche one. So I'll understand, that there are more important things to do. After your comment, I just realized BIT uses However, it is also possible with I think it could be implemented by allowing arbitrary ssh options like the "Paste additional options to rsync" in "Expert Options" |
Thank your for reporting back. I wonder myself if the key-file specified in "Manage profiles" dialog is just to access the jump host or to access the backup host with a jumphost inbetween... (#1931) EDIT: Let me know if "Add prefix to SSH command..." (Export Options) works for you. Then I will add this special case to the documentation. |
I do not think it is possible to do with "Add prefix to SSH command". It would need a new settings, which adds ssh options to the ssh command like "Paste additional options to rsync", which is placed after "rsync" in the command line. Another way would be to allow using ssh config files. So instead of specifying |
Just for my own learning. Why don't you let the jump host manage its keyfile to access the destination host? |
It is a bit more secure, so when the jump server is compromised, it still cannot connect to the remote server. |
First of all, great tool!
I saw, that in version 1.5 proxy jumps made it into the tool. However, my remote ssh connection works with another keyfile for the ProxyJump. However according to the ssh implementation there is no keyfile used for proxy jumps.
Is there a workaround for that or does this needs to be implemented?
The text was updated successfully, but these errors were encountered: