GitHub's "teams" feature is basically a free, zero-ops IdP. Let's use it to authenticate to OpenSSH! You probably shouldn't use this in production, but I can't stop you.
/username.keys
) to retrieve someone's SSH keys.authorized_keys
. Learn more by running man sshd_config
.Install aeneid with your favorite package manager...
cargo: cargo install aeneid --root /usr/local/bin
(important: ~/.cargo won't work, specify --root)
Automatic Configuration
If you installed from a non-cargo package manager, everything should be automatically configured. Just add credentials to /etc/aeneid/config.toml
.
If you're on Linux and installed from cargo, you can run sudo aeneid --init init
, and then add credentials to /etc/aeneid/config.toml
.
If none of the above apply to you, see the manual configuration instructions below.
Manual Configuration
The configuration lives in /etc/aeneid/config.toml
. If it doesn't exist, create it based on the src/config.toml
in this repository. All fields should have comments explaining what they do.
You'll also need to set AuthorizedKeysCommand /path/to/bin/aeneid
and AuthorizedKeysCommandRunAs aeneid
in your sshd_config (typically /etc/ssh/sshd_config
) so that OpenSSH knows where to get keys from.
If your GitHub username starts with a number, prefix your username with an _
to login. Otherwise, your username is your GitHub username. See the unix_to_github
function in main.rs
for more information.
Automatically creating users is currently unsupported, you'll need to create the corresponding user manually before logging in (adduser username
).
bash
$ ssh username@example.com # that's it
I've thought about security a little, but not nearly as much as I'd like. I don't recommend using this anywhere security is important. It's your responsibility to ensure that...
/etc/aeneid
and all children are owned by a separate user (call it aeneid
) and set with restrictive permissions (chmod 600
)AuthorizedKeysCommandRunAs
is set to the separate user that owns /etc/aeneid
Why did you make this?
I really didn't want to set up LDAP. I really really didn't want to set up LDAP. I really really really really really really didn't want to set up LDAP. In the end I set up LDAP, so hopefully this is useful to someone else.
What's with the name?
I thought it was silly. You're accepting a present (free, zero-ops IdP), but in the process, GitHub could silently swap out the public keys it returns and authenticate to your machines. So if you squint: trojan horse.