[EXTERNAL] Re: Signed SSH keys do not handle port forwarding correctly

Brian Candler b.candler at pobox.com
Fri May 7 17:51:16 AEST 2021


On 07/05/2021 08:27, Rory Campbell-Lange wrote:
> On 07/05/21, Kadel-Garcia, Nico (nico.kadel-garcia at cengage.com) wrote:
>> Oh, yes, it's Hashicorp Vault. It's been a very long day.
>>
>> I enabled the "permit-port-forwardig" option in the ssh-client-signer role, and it did not help.
> You may want to set the receiving sshd LogLevel to VERBOSE to help find out what the problem is.

Also, inspect the certificate with ssh-keygen -Lf <file>, just to be 
sure the desired extension is in there. e.g.

$ ssh-keygen -Lf test.cert
test.cert:
         Type: ssh-rsa-cert-v01 at openssh.com user certificate
         Public key: RSA-CERT SHA256:mVV81....
         Signing CA: RSA SHA256:nqMqs.... (using rsa-sha2-256)
         Key ID: "vault-root-99557c...."
         Serial: 10087169145372651617
         Valid: from 2021-02-22T14:47:42 to 2021-02-23T02:48:12
         Principals:
                 test
         Critical Options: (none)
*        Extensions:**
**                permit-pty*

Note that if you put permit-port-forwarding in "allowed_extensions" 
and/or "default_extensions" in the signing role, but the client 
specifically requests a set of extensions that doesn't include 
permit-port-forwarding, then the certificate won't include it.




More information about the openssh-unix-dev mailing list