Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

workaround for bastion host with IAM user auth #247

Closed
wants to merge 1 commit into from

Conversation

andreaswittig
Copy link
Contributor

AWS changed the configuration for sshd by adding their own AuthorizedKeysCommand. Doing so breaks the IAM user authentication used by our template at the moment.

This PR includes a workaround that we should use until a) AWS announced the new feature which allows us to replace the IAM authentication for SSH completely or b) we decide to deprecate IAM auth and switch to Sessions Manager/VPN instead.

@michaelwittig
Copy link
Contributor

michaelwittig commented Dec 28, 2018

This bug should be fixed in all templates that use Amazon Linux 2 ?

It should be possible to extend /opt/authorized_keys_command.sh to call /opt/aws/bin/curl_authorized_keys %u %f at the end. %u is $1 in /opt/authorized_keys_command.sh. I'm not sure if we get the fingerprint %f but this could be changed without breaking /opt/authorized_keys_command.sh` ?

or widdix/aws-ec2-ssh#142 (comment)

@andreaswittig andreaswittig deleted the issue-246-ssh-iam-user branch January 9, 2019 07:41
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants