# sys-ssh-agent SSH Agent through Qrexec in Qubes OS. ## Table of Contents * [Description](#description) * [Security](#security) * [Installation](#installation) * [Access Control](#access-control) * [Usage](#usage) * [Server](#server) * [Generate keys](#generate-keys) * [Limit key usage](#limit-key-usage) * [Reload agent](#reload-agent) * [Debug Agent side](#debug-agent-side) * [Client](#client) * [Enable and Start the service](#enable-and-start-the-service) * [Single agent per client](#single-agent-per-client) * [Multiple agents per client](#multiple-agents-per-client) * [Credits](#credits) ## Description The key pairs are stored on the offline ssh-agent server named "sys-ssh-agent", and requests are passed from clients to the server via Qrexec. Clients may access the same ssh-agent of a qube, or access different agents. In other words, this is an implementation of split-ssh-agent. The client does not know the identity of the ssh-agent server, nor are keys kept in memory in the client. This method is ideal for cases where you have a number of key pairs, which are used by different qubes. A centralized SSH server is very useful not only for keeping your private keys safe, but also for keeping your workflow organized. You can delete qubes that are SSH clients without loosing access to your remote server, because the authentication keys are on the sys-ssh-agent server, your client qube should only hold the SSH configuration, which can be reconstructed. ## Security The private keys are never stored in the client qube, not even in memory, but certain attack scenarios are still possible because there is no filtering proxy, in fact the client controls the agent in the server it is connecting to. A rogue client has full control of the allowed agent, therefore it can: 1. Use the keys for as long as the client runs; 2. Lock the agent with `ssh-add -X`; and 3. Delete keys from memory by issuing `ssh-add -D` ## Installation - Top: ```sh qubesctl top.enable sys-ssh-agent qubesctl --targets=tpl-sys-ssh-agent,sys-ssh-agent state.apply qubesctl top.disable sys-ssh-agent ``` - State: ```sh qubesctl state.apply sys-ssh-agent.create qubesctl --skip-dom0 --targets=tpl-sys-ssh-agent state.apply sys-ssh-agent.install qubesctl --skip-dom0 --targets=sys-ssh-agent state.apply sys-ssh-agent.configure ``` Installation on the client template: ```sh qubesctl --skip-dom0 --targets=TEMPLATE state.apply sys-ssh-agent.install-client ``` ## Access Control _Default policy_: `deny` `all` requests requesting to use the `qusal.SshAgent` RPC service. As the default policy does not configure any allow rule, you are responsible for doing so. Allow access to the specified agent based on the qube tag: ```qrexecpolicy qusal.SshAgent +work @tag:work @default allow target=sys-ssh-agent qusal.SshAgent +work @anyvm @anyvm deny qusal.SshAgent +personal @tag:personal @default ask target=sys-ssh-agent default_target=sys-ssh-agent qusal.SshAgent +personal @anyvm @anyvm deny ``` Ask access from `untrusted` qubes to the untrusted agent: ```qrexecpolicy qusal.SshAgent +untrusted untrusted @default ask target=sys-ssh-agent default_target=sys-ssh-agent qusal.SshAgent +untrusted @anyvm @anyvm deny ``` Ask access from `trusted` to use the agent `trusted` on the alternative qube agent named `sys-ssh-agent-trusted`: ```qrexecpolicy qusal.SshAgent +trusted trusted @default ask target=sys-ssh-agent-trusted default_target=sys-ssh-agent-trusted qusal.SshAgent +trusted @anyvm @anyvm deny ``` Always recommended to end with an explicit deny rule: ```qrexecpolicy qusal.SshAgent * @anyvm @anyvm deny ``` ## Usage ### Server #### Generate keys Keys can be selectively allocated to different ssh-agents by adding them to different directories under `~/.ssh/identities.d/`, where the `` directory should have the same name as the agent itself. Example: `~/.ssh/identities.d/work`. Import preexisting keys to the agent directory or generate keys for a specific agent: ```sh mkdir -m 0700 -p ~/.ssh/identities.d/ ssh-keygen -t ed25519 -f ~/.ssh/identities.d//id_example ``` You would do the following for the `work` agent: ```sh mkdir -m 0700 -p ~/.ssh/identities.d/work ssh-keygen -t ed25519 -f ~/.ssh/identities.d/work/id_example ``` #### Limit key usage For exceptionally valuable keys you may want to limit the time that they are available and the agent forwarding permission to different hosts. You can set custom options by writing them to a file on the same path of the private key, but ending with the suffix `.ssh-add-option`. If the key is named `id_ed25519`, the option file should be named `id_ed25519.ssh-add-option`. The `.ssh-add-option` file has the following format: ```sh # id_ed25519.ssh-add-option -q -t 600 -h "perseus@cetus.example.org" -h "scylla.example.org" -h "scylla.example.org>medea@charybdis.example.org" ``` Or you can manually add the key to the agent which are not located under the `~/.ssh/identities.d` directory so they aren't automatically added (substitute AGENT, SECS, and LIFE for their appropriate values): ```sh SSH_AUTH_SOCK="/run/user/1000/qubes-ssh-agent/.sock" ssh-add -t -f ``` #### Reload agent The keys are added to the agent on the first call to that specific agent. If you have added keys to the correct agent directory but haven't rebooted yet, you will have to add the keys by executing: ```sh qvm-ssh-agent reload qvm-ssh-agent reload work ``` #### Debug Agent side You can list agents and their keys with: ```sh qvm-ssh-agent ls ``` Follow SSH agents journal: ```sh journalctl --user -fu qubes-ssh-agent@*.service ``` ### Client #### Enable and Start the service Enable and start the connection to the SSH Agent via Qrexec for specified ``: ```sh sudo systemctl --no-block restart qubes-ssh-agent-forwarder@.service sudo systemctl --no-block restart qubes-ssh-agent-forwarder@personal.service ``` You can start the service on boot if you place the above line `/rw/config/rc.local` of the client. The ssh-agent socket will be at `/tmp/qubes-ssh-agent-forwarder/.sock`. You can test the connection is working with: ```sh SSH_AUTH_SOCK="/tmp/qubes-ssh-agent-forwarder/personal.sock" ssh-add -l ``` #### Single agent per client You might want to set the `SSH_AUTH_SOCK` and `SSH_AGENT_PID` environment variables to point to the `work` agent so every connection will use the same agent: ```sh echo 'export SSH_AUTH_SOCK=/tmp/qubes-ssh-agent-forwarder/work.sock; SSH_AGENT_PID="$(pgrep -f "/tmp/qubes-ssh-agent-forwarder/work.sock")"; ' | tee -a ~/.profile ``` #### Multiple agents per client In case you have multiple agents that you want to use in the same client, messing with the environment every time you want to make a connection to a different agent is not an alternative. Instead, use SSH client native method, the `IdentityAgent` option. You can control the SSH agent via SSH command-line option: ```sh ssh -o IdentityAgent=/tmp/qubes-ssh-agent-forwarder/personal.sock personal-site.com ssh -o IdentityAgent=/tmp/qubes-ssh-agent-forwarder/work.sock work-site.com ``` You can control the SSH agent via SSH configuration: ```sshconfig Host personal IdentityAgent /tmp/qubes-ssh-agent-forwarder/personal.sock ... Host work IdentityAgent /tmp/qubes-ssh-agent-forwarder/work.sock ... ``` ## Credits - [Unman](https://github.com/unman/qubes-ssh-agent)