Describe the bug
Security keys are a crucial step to securely logging into remote systems. Refusing to implement them has dire consequences towards attempts to lock down systems
To Reproduce
Steps to reproduce the behavior:
`ssh-copy-id -i
ssh -i
Password login requested
Expected behavior
An implementation of the latest stable ssh server standards should find accepting a secure-key login trivial.
Desktop (please complete the following information):
Linux, all variants supporting ssh hardware keys.
Additional context
The keys in question start with
sk-ssh-ed25519@openssh.com
Attempts to add these keys into QTS via the customised SSH key folder in /etc/config/ssh/ fail to invoke the keys.
Describe the bug Security keys are a crucial step to securely logging into remote systems. Refusing to implement them has dire consequences towards attempts to lock down systems
To Reproduce Steps to reproduce the behavior:
Expected behavior An implementation of the latest stable ssh server standards should find accepting a secure-key login trivial.
Desktop (please complete the following information):
Additional context The keys in question start with
sk-ssh-ed25519@openssh.com
Attempts to add these keys into QTS via the customised SSH key folder in
/etc/config/ssh/
fail to invoke the keys.