Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

authorized_keys_path with -a option #68

Open
glennie opened this issue Nov 28, 2019 · 9 comments
Open

authorized_keys_path with -a option #68

glennie opened this issue Nov 28, 2019 · 9 comments

Comments

@glennie
Copy link

glennie commented Nov 28, 2019

Hello,
I setup tmate-ssh-server few weeks ago using the docker container image provided and used '-a' to provide a file containing the ssh public keys.

On latest docker container image (tested on 2019-11-29), '-a' option is not available. How can I provide a file containing all the public keys to tmate-ssh-server?
Many thanks and kind regards,

@glennie
Copy link
Author

glennie commented Nov 28, 2019

Hi,
Looking into the code, the option has been removed in the commit 48884c9.

Do you think it is possible to get this option back? Maybe by merging server side public keys with the list provide by the client?

This option was very useful to limit access to the publicly hosted tmate-ssh-server.
Kind regards,

@nviennot
Copy link
Member

Yes, I'll see what I can do.

A pull request is always welcome though :)

@glennie
Copy link
Author

glennie commented Nov 29, 2019

Hi,
Thanks.
I'm not skilled in C :-c.
But, I can beta test the change before merging it into master, if you want.
Kind regards,

@varac
Copy link
Contributor

varac commented Apr 28, 2020

I'm also missing the option to limit access to a non-public instance. Please bring it back, thanks !

@varac
Copy link
Contributor

varac commented Apr 28, 2020

@juniorz In case you're still using tmate-ssh-server, would you be willing to bring back your original PR ❤️ ?

@gee-forr
Copy link

gee-forr commented Feb 3, 2021

Apologies on bumping an old issue...

I've recently spun up my own tmate instance as well, and whilst it's great that fingerprint config has to be shared so that access can be granted, I really do want to limit access to my tmate server to only team members via some kind of pub key auth.

I also tried the -a switch and got the same results using the latest docker image. Any chance this feature could make a return?

@ebardie
Copy link
Contributor

ebardie commented Nov 12, 2021

@gee-forr @varac I've added a PR to enforce the use of authorized_keys (from the tmate session) for connexions to the server : #93

This means that different sessions can have different sets of authorized keys, but only connexions which match an authorized key will be accepted.

@oscarh
Copy link

oscarh commented Feb 24, 2022

We're really talking about two different things here, right? The -a option was to limit who can create a tmate session on the server (which I really think should be doable), and -A option added in #93 is to force sessions to use authorized keys to authorize access to a session...

I would really like to run my own tmate server, but don't want it to be open to the world. Also really don't want to limit in on IPs in a firewall...

@nviennot do you remember why the -a option was removed in 48884c9?

@zephxs
Copy link

zephxs commented Nov 10, 2023

I just give a try to the private server but soon realized it could not be restricted to an authorized key file..
I was so disappointed when reading this "status".
I had to deinstall tmate because of this. It's clearly a needed option, in my perspective.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

7 participants