2023-11-13 09:33:28 -05:00
|
|
|
# ssh
|
|
|
|
|
|
|
|
SSH remote login client in Qubes OS.
|
|
|
|
|
|
|
|
## Table of Contents
|
|
|
|
|
|
|
|
* [Description](#description)
|
|
|
|
* [Installation](#installation)
|
|
|
|
* [Usage](#usage)
|
|
|
|
|
|
|
|
## Description
|
|
|
|
|
|
|
|
Setup SSH client AppVM ssh and a DispVM Template "dvm-ssh".
|
|
|
|
It's use is plain simple, SSH to servers, no extra configuration is required.
|
|
|
|
When saving the SSH configuration is necessary, use the ssh qube. If login
|
|
|
|
in as a one time connection or to an untrusted host use a DispVM based on
|
|
|
|
"dvm-ssh" for disposability.
|
|
|
|
|
|
|
|
## Installation
|
|
|
|
|
|
|
|
- Top:
|
|
|
|
```sh
|
2024-02-23 10:54:35 -05:00
|
|
|
sudo qubesctl top.enable ssh
|
|
|
|
sudo qubesctl --targets=tpl-ssh,dvm-ssh,ssh state.apply
|
|
|
|
sudo qubesctl top.disable ssh
|
2023-11-13 09:33:28 -05:00
|
|
|
```
|
|
|
|
|
|
|
|
- State:
|
|
|
|
<!-- pkg:begin:post-install -->
|
|
|
|
```sh
|
2024-02-23 10:54:35 -05:00
|
|
|
sudo qubesctl state.apply ssh.create
|
|
|
|
sudo qubesctl --skip-dom0 --targets=tpl-ssh state.apply ssh.install
|
|
|
|
sudo qubesctl --skip-dom0 --targets=dvm-ssh,ssh state.apply ssh.configure
|
2023-11-13 09:33:28 -05:00
|
|
|
```
|
|
|
|
<!-- pkg:end:post-install -->
|
|
|
|
|
|
|
|
## Usage
|
|
|
|
|
|
|
|
Create DispVMs based on the Template for DispVMs "dvm-ssh" for disposable SSH
|
|
|
|
sessions or create AppVMs based on "tpl-ssh", such as the "ssh" qube for for
|
|
|
|
preserving the SSH configuration client side.
|
|
|
|
|
|
|
|
The client qube can enhanced by being:
|
|
|
|
|
|
|
|
- sys-ssh-agent's client and not storing the SSH keys on the client; or
|
|
|
|
- sys-git's client and fetching from qubes and push to remote servers.
|
|
|
|
|
|
|
|
The server requires the OpenSSH server to be installed.
|