Marco Ricci commited on 2024-11-27 15:10:52
Zeige 3 geänderte Dateien mit 23 Einfügungen und 23 Löschungen.
For all documentation, whenever a formatted key listing of suitable keys is presented, use the test keys from the test suite if possible. Also, correct a typo.
... | ... |
@@ -81,9 +81,9 @@ On UNIX-like systems with OpenSSH or PuTTY installed, you can use an Ed25519, Ed |
81 | 81 |
```` shell-session |
82 | 82 |
$ derivepassphrase vault -k my-email-account |
83 | 83 |
Suitable SSH keys: |
84 |
-[1] ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQ... test key |
|
85 |
-[2] ssh-ed448 AAAACXNzaC1lZDQ0OAAAADni9nLTT1... test key |
|
86 |
-[3] ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIF4gW... test key |
|
84 |
+[1] ssh-rsa ...feXycsvJZ2uaYRjMdZeJGNAnHLUGLkBscw5aI8= test key without passphrase |
|
85 |
+[2] ssh-ed448 ...BQ72ZgtPMckdzabiz7JbM/b0JzcRzGLMsbwA= test key without passphrase |
|
86 |
+[3] ssh-ed25519 ...gJIXw//Mkhv5MEwidwcakUGCekJD/vCEml2 test key without passphrase |
|
87 | 87 |
Your selection? (1-3, leave empty to abort): 1 |
88 | 88 |
oXDGCvMhLWPQyCzYtaobOq2Wh9olYj |
89 | 89 |
```` |
... | ... |
@@ -94,9 +94,9 @@ This choice can be made either specifically for the service (in this case, `my-e |
94 | 94 |
```` shell-session |
95 | 95 |
$ derivepassphrase vault --config -k # global setting |
96 | 96 |
Suitable SSH keys: |
97 |
-[1] ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQ... test key |
|
98 |
-[2] ssh-ed448 AAAACXNzaC1lZDQ0OAAAADni9nLTT1... test key |
|
99 |
-[3] ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIF4gW... test key |
|
97 |
+[1] ssh-rsa ...feXycsvJZ2uaYRjMdZeJGNAnHLUGLkBscw5aI8= test key without passphrase |
|
98 |
+[2] ssh-ed448 ...BQ72ZgtPMckdzabiz7JbM/b0JzcRzGLMsbwA= test key without passphrase |
|
99 |
+[3] ssh-ed25519 ...gJIXw//Mkhv5MEwidwcakUGCekJD/vCEml2 test key without passphrase |
|
100 | 100 |
Your selection? (1-3, leave empty to abort): 1 |
101 | 101 |
$ derivepassphrase vault my-email-account |
102 | 102 |
oXDGCvMhLWPQyCzYtaobOq2Wh9olYj |
... | ... |
@@ -80,9 +80,9 @@ Next, configure `derivepassphrase vault` to use the loaded SSH key. |
80 | 80 |
~~~~ console |
81 | 81 |
$ derivepassphrase vault --config -k |
82 | 82 |
Suitable SSH keys: |
83 |
- [1] ssh-ed25519 ...n6tMofjJyWHLyjEXfXsJhBt+OuheHzPA/xRUqw developer key |
|
84 |
- [2] ssh-rsa ...Cr5XE5ZbIjm1NYmxZ81G5IJkMgF3JTSE1PfQgbVHE= my key comment |
|
85 |
- [3] ssh-ed25519 ...iimqEbE9kUM+G+g12hhuDNfsI/S02xtaphIOOH vault key |
|
83 |
+ [1] ssh-rsa ...feXycsvJZ2uaYRjMdZeJGNAnHLUGLkBscw5aI8= test key without passphrase |
|
84 |
+ [2] ssh-ed448 ...BQ72ZgtPMckdzabiz7JbM/b0JzcRzGLMsbwA= test key without passphrase |
|
85 |
+ [3] ssh-ed25519 ...gJIXw//Mkhv5MEwidwcakUGCekJD/vCEml2 test key without passphrase |
|
86 | 86 |
Your selection? (1-3, leave empty to abort): 3 |
87 | 87 |
~~~~ |
88 | 88 |
|
... | ... |
@@ -97,9 +97,9 @@ Next, configure `derivepassphrase vault` to use the loaded SSH key. |
97 | 97 |
~~~~ console |
98 | 98 |
$ derivepassphrase vault --config -k SERVICE |
99 | 99 |
Suitable SSH keys: |
100 |
- [1] ssh-ed25519 ...n6tMofjJyWHLyjEXfXsJhBt+OuheHzPA/xRUqw developer key |
|
101 |
- [2] ssh-rsa ...Cr5XE5ZbIjm1NYmxZ81G5IJkMgF3JTSE1PfQgbVHE= my key comment |
|
102 |
- [3] ssh-ed25519 ...iimqEbE9kUM+G+g12hhuDNfsI/S02xtaphIOOH vault key |
|
100 |
+ [1] ssh-rsa ...feXycsvJZ2uaYRjMdZeJGNAnHLUGLkBscw5aI8= test key without passphrase |
|
101 |
+ [2] ssh-ed448 ...BQ72ZgtPMckdzabiz7JbM/b0JzcRzGLMsbwA= test key without passphrase |
|
102 |
+ [3] ssh-ed25519 ...gJIXw//Mkhv5MEwidwcakUGCekJD/vCEml2 test key without passphrase |
|
103 | 103 |
Your selection? (1-3, leave empty to abort): 3 |
104 | 104 |
~~~~ |
105 | 105 |
|
... | ... |
@@ -163,18 +163,18 @@ widely implemented. |
163 | 163 |
Your identification has been saved in .../.ssh/my-vault-ed25519-key |
164 | 164 |
Your public key has been saved in .../.ssh/my-vault-ed25519-key.pub |
165 | 165 |
The key fingerprint is: |
166 |
- SHA256:BKD43lBB7qh4VvZxq6xSYDXUUbXF6snrRF7qUnOx1PA vault key |
|
166 |
+ SHA256:0h+WAokssfhzfzVyuMLJlIcWyCtk5WiXI8BHyhXYxC0 vault key |
|
167 | 167 |
The key's randomart image is: |
168 | 168 |
+--[ED25519 256]--+ |
169 |
- | o=ooo..... | |
|
170 |
- | . oo... oo | |
|
171 |
- |. ..o. . .. + | |
|
172 |
- | .o+ . . o E | |
|
173 |
- | .+.+ . So.o.o | |
|
174 |
- |.o =.. o +*oo | |
|
175 |
- |o +.. . ..++ | |
|
176 |
- | o. . ..o. | |
|
177 |
- | ...o oo | |
|
169 |
+ |o B=+ | |
|
170 |
+ |.=oE = . | |
|
171 |
+ |.oX @ + | |
|
172 |
+ | = + o * . . | |
|
173 |
+ | + o * S B | |
|
174 |
+ | + * + O o | |
|
175 |
+ | * o . | |
|
176 |
+ | o | |
|
177 |
+ | | |
|
178 | 178 |
+----[SHA256]-----+ |
179 | 179 |
~~~~ |
180 | 180 |
|
... | ... |
@@ -197,7 +197,7 @@ widely implemented. |
197 | 197 |
=== "GnuPG" |
198 | 198 |
|
199 | 199 |
Not supported natively. An alternative SSH client distribution |
200 |
- such as OpenSSH or PuTTY is necessary |
|
200 |
+ such as OpenSSH or PuTTY is necessary. |
|
201 | 201 |
|
202 | 202 |
Alternatively, GnuPG supports reusing keys in its native OpenPGP |
203 | 203 |
format for SSH as long as the underlying key type is compatible. |
204 | 204 |