Take a look at ssh-agent. It’s bundled with ssh-client and designed to solve this problem.
The quick usage is, create a terminal and run:
eval `ssh-agent`
ssh-add /path/to/your/encrypted/key1
#type in password
ssh-add /path/to/your/encrypted/key2
...
# all commands in this terminal will use the keys above w/o asking you for a password
git clone git@githib.com...
git push...
etc
So, basically you type your credentials once during the life cycle of your terminal.
If you really want to go full power-user, simple run ssh-agent (without the eval) and you’ll see it just sets some env-vars, which can be imported into any terminal/shell you have open.
So, if you put some logic in your shells rc file, you can effectively share a single ash-agent between all your shells, meaning you just need to type your password for your keys once when you log into your system… and your now passwordless for any future terminals you create (this is my setup).
Also, if you’re interested take a peek at the man pages for ash-agent. It has a few interesting features (ie: adding a password lock for your agent, removing keys from the agent, etc).
I see they really wanted to fit the acronym to RAMBO, lol.
But it makes sense. Considering, we keep out mobile phones in around a metre’s reach, it would be trivial to just get that information just from key sounds.
Guess I better get one of those high frequency faraday cages, huh?
Yeah, but who wants to type in a password everytime they push/pull?
Take a look at
ssh-agent
. It’s bundled with ssh-client and designed to solve this problem.The quick usage is, create a terminal and run:
eval `ssh-agent` ssh-add /path/to/your/encrypted/key1 #type in password ssh-add /path/to/your/encrypted/key2 ... # all commands in this terminal will use the keys above w/o asking you for a password git clone git@githib.com... git push... etc
So, basically you type your credentials once during the life cycle of your terminal.
If you really want to go full power-user, simple run
ssh-agent
(without the eval) and you’ll see it just sets some env-vars, which can be imported into any terminal/shell you have open.So, if you put some logic in your shells rc file, you can effectively share a single ash-agent between all your shells, meaning you just need to type your password for your keys once when you log into your system… and your now passwordless for any future terminals you create (this is my setup).
Also, if you’re interested take a peek at the man pages for ash-agent. It has a few interesting features (ie: adding a password lock for your agent, removing keys from the agent, etc).
I have
if [ -z "$SSH_AUTH_SOCK" ] ; then eval $(ssh-agent -s) fi
At the end of .bashrc and
AddKeysToAgent yes
In .ssh/config so that it auto-adds keys I unlock.
I do it.
Every time.
And I keep a wired keyboard for it.
Get a load of Ross Ulbricht ovah here!
https://www.tomshardware.com/tech-industry/cyber-security/researchers-snoop-data-from-air-gapped-pcs-ram-sticks-by-monitoring-em-radiation-from-23-feet-away
I get keyboards probably have more range, but i worry privacy was gone a long time ago.
I see they really wanted to fit the acronym to RAMBO, lol.
But it makes sense. Considering, we keep out mobile phones in around a metre’s reach, it would be trivial to just get that information just from key sounds. Guess I better get one of those high frequency faraday cages, huh?
There are a few on audio, I saw one where they read HDMI over the air from 60 ft away.
I’d kinda like to see Bluetooth shored up a bit maybe require a tap to bind every day.
Wow! Was that stuff even EMCD compliant?
You can read the cables, you can read the transceivers in the video card, in a lot of the screens you can even read the panel changing itself.
Our ability is to remote sense EMF is absolutely ridiculous these days.
Then there’s crap like the espionage where they change fan speeds. Or flash an infrared proximity sensor on a cell phone to exfiltrate data.
I thought that stuff went away with CRTs.
But I guess that makes sense. We could hear CRTs with out ears, now we just need more sensitive equipment.