Questions tagged [rsa]
190 questions
7
votes
1 answer
If I get a certificate signed for ECDSA will older browsers be able to use RSA?
I'm looking into using ECDHE-ECDSA and there are a lot of great articles on why (https://hynek.me/articles/hardening-your-web-servers-ssl-ciphers/) and (http://blog.cloudflare.com/ecdsa-the-digital-signature-algorithm-of-a-better-internet), for…

paintedbicycle
- 199
- 1
- 3
- 15
7
votes
6 answers
SSH login using public key failed
On localhost running sshd service. Created two pairs of rsa keys for root and user1 using ssh-keygen. Copied from root/.ssh/id_rsa.pub to user1/.ssh/id_rsa.pub. Changed permissions to 600. Tried ssh -l user1 localhost and ssh -l root localhost but…

J.Olufsen
- 303
- 2
- 3
- 9
7
votes
1 answer
RSA key, github keeps asking for my password
Okay folks, noob RSA question here.
I have a production server, and I've generated an rsa key there. I've then taken the public key (id_rsa.pub) and given that to github, as a deploy key I believe.
What I'm trying to do is automate a deployment…

thekevinscott
- 185
- 1
- 7
6
votes
1 answer
How to convert DER formatted public key file to PEM form
I need to use the PEM formatted public key for some purpose, but not finding the command which can convert DER formatted public key to PEM formatted public key.
The command I have used -
openssl rsa -in user_id_rsa.pub -inform DER -outform PEM…

CodeQuestor
- 235
- 1
- 2
- 6
6
votes
4 answers
OpenSSH server Authentication refused
I am running a Linux version 2.6.27-vpac2 on a PXA270 platform (armv5tel)
I have a version of OpenSSH 3.8.1 p1 (Debian-8.sarge.4) trying to get to run on it.
I have run the sshd in -ddd format to debug and below is the result when I try to connect:
…

Marjon
- 71
- 1
- 1
- 3
6
votes
2 answers
How To Organize and Use Multiple RSA Keys On Local Machine?
I have Server_A, Server_B, and Server_C.
I want to generate unique authentication keys for each, and organize them on my local machine running Lion like so:
Put server_A keys in Users/username/.ssh/server_A
Put server_B keys in…

bottles
- 389
- 1
- 2
- 11
6
votes
3 answers
SSH No Matching Host Key Type Found
I have two servers,
S1: My machine, Windows 8, OpenSSH 8.8p1, OpenSSL 1.1.11 2021-08-24,
S2: A Remote Server, Linux, Open SSH 5.3p1, OpenSSL 1.0.1e-fips 2013-02-11.
The message I have trying to investigate how to solve is
Unable to negotiate with…

Brethlosze
- 165
- 1
- 1
- 7
5
votes
1 answer
How to export private key? (GnuPG)
I have successfully created GnuPG public/private key pair using RSA and RSA algorithm. How can I export a public key and private key in the form of file with the .asc extension?

rancho
- 181
- 1
- 1
- 4
5
votes
1 answer
Keeping track of SSH private keys without comments
SSH public keys support comments (which simply consist of text appended to the end of the key), which makes it easy to identify an otherwise unidentifiable id_rsa.pub file. You can use the comment to store information such as who the key belongs to,…

Frogging101
- 53
- 1
- 7
5
votes
2 answers
Can't allow users to log in via SSH (Bash, OpenSSH, CentOS 6.5)
I am running a CentOS 6.5 machine remotely via SSH. I use RSA keys and have disabled password authentication. The problem that I am having is that whenever I add a new user and want him/her to log in via SSH, they are denied access.
At first this…

gillytech
- 329
- 1
- 3
- 12
5
votes
1 answer
Pros / cons of using password-less OpenVPN client keys
I'm setting up an OpenVPN server for my organization, and I'm reading up on the different ways that the client side keys work. I'm still a little unfamiliar with all of the concepts behind these client keys and account auth.
What are the real…

andrewvnice
- 157
- 1
- 1
- 6
5
votes
1 answer
Is there a way to see which groups/users have access to an RSA key container?
I used aspnet_regiis to create an RSA key container (machine container).
I want to secure it and I know I can use the -pa and -pr commands to specify access. But is there a way to see which accounts/groups have access to it?
My concern is I…

kingdango
- 521
- 1
- 6
- 11
5
votes
4 answers
Any point using Denyhosts for SSH when only RSA key logins are allowed anyway?
Right, so if I can only SSH into my box by having the appropriate RSA keys configured, is there any point in using Denyhosts for SSH as well? Or is Denyhosts only looking at keyboard-interactive / password logins for SSH?
Don't get me wrong,…

Dougal
- 61
- 2
5
votes
2 answers
When routers communicate with HTTPS, how is their identity confirmed?
There's something I don't understand. Possibly I have some misunderstanding about how HTTPS works.
I heard that some wireless routers allow the user to access the administration page with HTTPS (which is a good idea because then you can configure…

Ram Rachum
- 5,231
- 7
- 34
- 46
5
votes
4 answers
Cisco ASA user authentication options - OpenID, public RSA sig, others?
My organization has a Cisco ASA 5510 which I have made act as a firewall/gateway for one of our offices. Most resources a remote user would come looking for exist inside. I've implemented the usual deal - basic inside networks with outbound NAT,…

Ryan
- 81
- 1
- 8