qusal/salt/ssh
2024-02-23 16:55:11 +01:00
..
clone.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
clone.top refactor: initial commit 2023-11-13 14:33:28 +00:00
configure.sls refactor: initial commit 2023-11-13 14:33:28 +00:00
configure.top fix: ssh top files missing list type matcher 2023-12-20 21:27:42 +01:00
create.sls chore: copyright update 2024-01-29 16:49:54 +01:00
create.top refactor: initial commit 2023-11-13 14:33:28 +00:00
init.top fix: ssh top files missing list type matcher 2023-12-20 21:27:42 +01:00
install.sls chore: copyright update 2024-01-29 16:49:54 +01:00
install.top refactor: initial commit 2023-11-13 14:33:28 +00:00
README.md doc: prefix qubesctl with sudo 2024-02-23 16:55:11 +01:00

ssh

SSH remote login client in Qubes OS.

Table of Contents

Description

Setup SSH client AppVM ssh and a DispVM Template "dvm-ssh". It's use is plain simple, SSH to servers, no extra configuration is required. When saving the SSH configuration is necessary, use the ssh qube. If login in as a one time connection or to an untrusted host use a DispVM based on "dvm-ssh" for disposability.

Installation

  • Top:
sudo qubesctl top.enable ssh
sudo qubesctl --targets=tpl-ssh,dvm-ssh,ssh state.apply
sudo qubesctl top.disable ssh
  • State:
sudo qubesctl state.apply ssh.create
sudo qubesctl --skip-dom0 --targets=tpl-ssh state.apply ssh.install
sudo qubesctl --skip-dom0 --targets=dvm-ssh,ssh state.apply ssh.configure

Usage

Create DispVMs based on the Template for DispVMs "dvm-ssh" for disposable SSH sessions or create AppVMs based on "tpl-ssh", such as the "ssh" qube for for preserving the SSH configuration client side.

The client qube can enhanced by being:

  • sys-ssh-agent's client and not storing the SSH keys on the client; or
  • sys-git's client and fetching from qubes and push to remote servers.

The server requires the OpenSSH server to be installed.