diff --git a/compose.yaml b/compose.yaml index bf04041..2b8f826 100644 --- a/compose.yaml +++ b/compose.yaml @@ -12,7 +12,7 @@ services: dockerfile: Dockerfile - hostname: shinobilinux + hostname: asterion domainname: linux.softwareshinobi.com @@ -20,6 +20,10 @@ services: - "2222:22" + volumes: + + - "./tmp:/tmp" + linux.softwareshinobi.com-landing: container_name: linux.softwareshinobi.com-landing diff --git a/readme.md b/readme.md index 9c74cbe..ac2ec23 100644 --- a/readme.md +++ b/readme.md @@ -64,6 +64,28 @@ Shinobi Academy Linux comes pre-installed with some interesting tools to enhance **Experimenting with these tools is a great way to explore the possibilities of Linux.** +## Issues + +when the container is bounced, the following error/warning is displayed. i want to avoid that as the containers will be bounced often. + +```bash +@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ +@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ +@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ +IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! +Someone could be eavesdropping on you right now (man-in-the-middle attack)! +It is also possible that a host key has just been changed. +The fingerprint for the ED25519 key sent by the remote host is +SHA256:1mVaZmiBG+iX+aZxweT3zkZFnctabuzbeWQzojqNuJ4. +Please contact your system administrator. +Add correct host key in /home/shinobi/.ssh/known_hosts to get rid of this message. +Offending ED25519 key in /home/shinobi/.ssh/known_hosts:23 + remove with: + ssh-keygen -f '/home/shinobi/.ssh/known_hosts' -R '[localhost]:2222' +Host key for [localhost]:2222 has changed and you have requested strict checking. +Host key verification failed. +``` + ## Conclusion: By following these steps, you've successfully connected to Shinobi Academy Linux and begun your journey into the world of Linux. Use this platform to explore, experiment, and build your Linux skills! diff --git a/server/Dockerfile b/server/Dockerfile index 6a7e3b5..5690396 100755 --- a/server/Dockerfile +++ b/server/Dockerfile @@ -2,17 +2,17 @@ FROM ubuntu:questing ## +ARG DEBIAN_FRONTEND=noninteractive + +## + WORKDIR / COPY /provision / ## -ARG DEBIAN_FRONTEND=noninteractive - -## - -COPY /provision/provision.bash provision.bash +#COPY /provision/provision.bash provision.bash RUN bash provision.bash diff --git a/server/provision/legacy.bash b/server/provision/legacy.bash new file mode 100755 index 0000000..98ace72 --- /dev/null +++ b/server/provision/legacy.bash @@ -0,0 +1,94 @@ +#!/bin/bash + +## +## This script installs stuff +## to set up a linux server +## suitable for newbies. +## +## Before you go, check read around my blog! +## +## https://softwareshinobi.com +## +## + +set -e; + +set -x; + +## + +cat /etc/issue; + +echo "Shinobi Academy 24.04" > /etc/issue; + +cat /etc/issue; + +## + +apt update; + +## +## install bashrc systemwide +## + +##cp bashrc /usr/local/bin/bashrc + +##ls -l /tmp/.bashrc + +##cat /tmp/.bashrc; + +##source /tmp/.bashrc; + +## + +apt install -y vim nano; + +apt install -y hollywood; + +apt install -y cmatrix cmatrix-xfont; + +## +## shinobi academy user config +## + +groupadd -g 4444 shinobi + +useradd -u 4444 -g 4444 -rm -d /home/shinobi -s /bin/bash shinobi + +##useradd -rm -d /home/shinobi -s /bin/bash -u 1042 shinobi; + +echo 'shinobi:shinobi' | chpasswd + +## mkdir /home/shinobi/.ssh/ + +## cp /private.key /home/shinobi/.ssh/ + +## +## restrict permissions on home +## + +#chmod -R 555 /home/shinobi/ + +#chmod -R 555 /tmp/ + +## +## change MOTD +## + +## echo "hey?" > /etc/motd + +## +## start ssh server +## + +apt install -y openssh-server; + +apt install -y sudo; + +service ssh start; + +## +## finish +## + +echo "fin." diff --git a/server/provision/private.key b/server/provision/private.key deleted file mode 100644 index 1f22f4b..0000000 --- a/server/provision/private.key +++ /dev/null @@ -1 +0,0 @@ -the private key!! diff --git a/server/provision/provision (copy).bash b/server/provision/provision (copy).bash new file mode 100755 index 0000000..ff68745 --- /dev/null +++ b/server/provision/provision (copy).bash @@ -0,0 +1,78 @@ +#!/bin/bash + +## +## This script installs stuff +## to set up a linux server +## suitable for newbies. +## +## Before you go, check read around my blog! +## +## https://softwareshinobi.com +## +## + +set -e; + +set -x; + +## + +cd shinobi + +bash provision.bash + +cd .. + +## + +cat /etc/issue; + +echo "Shinobi Academy 24.04" > /etc/issue; + +cat /etc/issue; + +## + +apt update; + +## +## install bashrc systemwide +## + +##cp bashrc /usr/local/bin/bashrc + +##ls -l /tmp/.bashrc + +##cat /tmp/.bashrc; + +##source /tmp/.bashrc; + +## + +apt install -y vim nano; + +apt install -y hollywood; + +apt install -y cmatrix cmatrix-xfont; + +## +## change MOTD +## + +## echo "hey?" > /etc/motd + +## +## start ssh server +## + +apt install -y openssh-server; + +apt install -y sudo; + +service ssh start; + +## +## finish +## + +echo "fin." diff --git a/server/provision/provision.bash b/server/provision/provision.bash index 86c2f81..b89dfdb 100755 --- a/server/provision/provision.bash +++ b/server/provision/provision.bash @@ -17,78 +17,16 @@ set -x; ## -cat /etc/issue; +cd server -echo "Shinobi Academy 24.04" > /etc/issue; +bash sshd.bash -cat /etc/issue; +cd .. ## -apt update; +cd users/shinobi -## -## install bashrc systemwide -## +bash provision.bash -##cp bashrc /usr/local/bin/bashrc - -##ls -l /tmp/.bashrc - -##cat /tmp/.bashrc; - -##source /tmp/.bashrc; - -## - -apt install -y vim nano; - -## apt install -y hollywood; - -apt install -y cmatrix cmatrix-xfont; - -## -## shinobi academy user config -## - -groupadd -g 1042 shinobi - -useradd -u 1042 -g 1042 -rm -d /home/shinobi -s /bin/bash shinobi - -##useradd -rm -d /home/shinobi -s /bin/bash -u 1042 shinobi; - -echo 'shinobi:shinobi' | chpasswd - -mkdir /home/shinobi/.ssh/ - -cp /private.key /home/shinobi/.ssh/ - -## -## restrict permissions on home -## - -chmod -R 555 /home/shinobi/ - -chmod -R 555 /tmp/ - -## -## change MOTD -## - -## echo "hey?" > /etc/motd - -## -## start ssh server -## - -apt install -y openssh-server; - -apt install -y sudo; - -service ssh start; - -## -## finish -## - -echo "fin." +cd ../.. diff --git a/server/provision/server/sshd.bash b/server/provision/server/sshd.bash new file mode 100755 index 0000000..21ee00f --- /dev/null +++ b/server/provision/server/sshd.bash @@ -0,0 +1,21 @@ +#!/bin/bash + +set -e; + +set -x; + +apt update; + +apt install -y openssh-server; + +apt install -y sudo; + +cp sshd_config /etc/ssh/sshd_config + +service ssh start; + +## +## finish +## + +echo "fin." diff --git a/server/provision/server/sshd_config b/server/provision/server/sshd_config new file mode 100644 index 0000000..f2b6180 --- /dev/null +++ b/server/provision/server/sshd_config @@ -0,0 +1,144 @@ +## revuelto!! + +# This is the sshd server system-wide configuration file. See +# sshd_config(5) for more information. + +# This sshd was compiled with PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games + +# The strategy used for options in the default sshd_config shipped with +# OpenSSH is to specify options with their default value where +# possible, but leave them commented. Uncommented options override the +# default value. +# +# In general, the first uncommented definition of an option takes precedence. +# For options that accept multiple values, like 'Port', subsequent definitions +# are appended to the configuration. +# +# Note that the above implies that configuration options from snippets in +# /etc/ssh/sshd_config.d/*.conf take precedence over those defined in this +# file. In addition, configuration snippet files are processed in lexical +# order, so options defined in files with names that sort earlier take +# precedence. +# +# Such configuration snippets may be present in default installations of +# Ubuntu. +Include /etc/ssh/sshd_config.d/*.conf + +# When systemd socket activation is used (the default), the socket +# configuration must be re-generated after changing Port, AddressFamily, or +# ListenAddress. +# +# For changes to take effect, run: +# +# systemctl daemon-reload +# systemctl restart ssh.socket +# +#Port 22 +#AddressFamily any +#ListenAddress 0.0.0.0 +#ListenAddress :: + +#HostKey /etc/ssh/ssh_host_rsa_key +#HostKey /etc/ssh/ssh_host_ecdsa_key +#HostKey /etc/ssh/ssh_host_ed25519_key + +# Ciphers and keying +#RekeyLimit default none + +# Logging +#SyslogFacility AUTH +#LogLevel INFO + +# Authentication: + +#LoginGraceTime 2m +#PermitRootLogin prohibit-password +#StrictModes yes +#MaxAuthTries 6 +#MaxSessions 10 + +PubkeyAuthentication yes + +# Expect .ssh/authorized_keys2 to be disregarded by default in future. +AuthorizedKeysFile .ssh/authorized_keys .ssh/authorized_keys2 + +#AuthorizedPrincipalsFile none + +#AuthorizedKeysCommand none +#AuthorizedKeysCommandUser nobody + +# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts +#HostbasedAuthentication no +# Change to yes if you don't trust ~/.ssh/known_hosts for +# HostbasedAuthentication +#IgnoreUserKnownHosts no +# Don't read the user's ~/.rhosts and ~/.shosts files +#IgnoreRhosts yes + +# To disable tunneled clear text passwords, change to no here! +#PasswordAuthentication yes +#PermitEmptyPasswords no + +# Change to yes to enable challenge-response passwords (beware issues with +# some PAM modules and threads) +KbdInteractiveAuthentication no + +# Kerberos options +#KerberosAuthentication no +#KerberosOrLocalPasswd yes +#KerberosTicketCleanup yes +#KerberosGetAFSToken no + +# GSSAPI options +#GSSAPIAuthentication no +#GSSAPICleanupCredentials yes +#GSSAPIStrictAcceptorCheck yes +#GSSAPIKeyExchange no + +# Set this to 'yes' to enable PAM authentication, account processing, +# and session processing. If this is enabled, PAM authentication will +# be allowed through the KbdInteractiveAuthentication and +# PasswordAuthentication. Depending on your PAM configuration, +# PAM authentication via KbdInteractiveAuthentication may bypass +# the setting of "PermitRootLogin prohibit-password". +# If you just want the PAM account and session checks to run without +# PAM authentication, then enable this but set PasswordAuthentication +# and KbdInteractiveAuthentication to 'no'. +UsePAM yes + +#AllowAgentForwarding yes +#AllowTcpForwarding yes +#GatewayPorts no +X11Forwarding yes +#X11DisplayOffset 10 +#X11UseLocalhost yes +#PermitTTY yes +PrintMotd yes +#PrintLastLog yes +#TCPKeepAlive yes +#PermitUserEnvironment no +#Compression delayed +#ClientAliveInterval 0 +#ClientAliveCountMax 3 +#UseDNS no +#PidFile /run/sshd.pid +#MaxStartups 10:30:100 +#PermitTunnel no +#ChrootDirectory none +#VersionAddendum none + +# no default banner path +#Banner none + +# Allow client to pass locale environment variables +AcceptEnv LANG LC_* + +# override default of no subsystems +Subsystem sftp /usr/lib/openssh/sftp-server + +# Example of overriding settings on a per-user basis +#Match User anoncvs +# X11Forwarding no +# AllowTcpForwarding no +# PermitTTY no +# ForceCommand cvs server diff --git a/server/provision/users/shinobi/bashrc/.bashrc b/server/provision/users/shinobi/bashrc/.bashrc new file mode 100644 index 0000000..370152e --- /dev/null +++ b/server/provision/users/shinobi/bashrc/.bashrc @@ -0,0 +1,2 @@ + +alias a="ls -lha" diff --git a/server/provision/users/shinobi/provision.bash b/server/provision/users/shinobi/provision.bash new file mode 100755 index 0000000..b3a4d6c --- /dev/null +++ b/server/provision/users/shinobi/provision.bash @@ -0,0 +1,48 @@ +#!/bin/bash + +## +## This script installs stuff +## to set up a linux server +## suitable for newbies. +## +## Before you go, check read around my blog! +## +## https://softwareshinobi.com +## +## + +set -e; + +set -x; + +## +## create user +## + +groupadd -g 4444 shinobi + +useradd -u 4444 -g 4444 -rm -d /home/shinobi -s /bin/bash shinobi + +## +## set password +## + +echo 'shinobi:shinobi' | chpasswd + +## +## set up keys +## + +cp -r ssh/ /home/shinobi/.ssh + +chmod -R 700 /home/shinobi/.ssh + +chown -R shinobi: /home/shinobi/.ssh + +## +## restrict permissions on home +## + +#chmod -R 555 /home/shinobi/ + +#chmod -R 555 /tmp/ diff --git a/server/provision/users/shinobi/ssh/authorized_keys b/server/provision/users/shinobi/ssh/authorized_keys new file mode 100644 index 0000000..7cf66e9 --- /dev/null +++ b/server/provision/users/shinobi/ssh/authorized_keys @@ -0,0 +1 @@ +ssh-rsa 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 troy@countach diff --git a/server/provision/users/shinobi/ssh/id_rsa b/server/provision/users/shinobi/ssh/id_rsa new file mode 100644 index 0000000..3c0d2f0 --- /dev/null +++ b/server/provision/users/shinobi/ssh/id_rsa @@ -0,0 +1,49 @@ +-----BEGIN OPENSSH PRIVATE KEY----- +b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAACFwAAAAdzc2gtcn +NhAAAAAwEAAQAAAgEAxQNXFYVbDZWQc2Vxx1JKOsOnNyP+IS/8u9s3iMvVWrYo5GPQ4ZZX +t5zs4qUc9GdLl0HCUuxJVaTGCF6e0gDqf0vBfDSZOMg7iMmC0TDgcNSiXT+Kn5wcBMQEm0 +DnD2/MnsTpzUcMsqcZkuocgstaL5uXKvcSsuqsBaSKFPTFIBNmVmXs9RJNfQGkQ5SLoQha +1eHcqN16ygQcZ0qn35CJWvfKYoxuiUB3DjRvyCMJqIZFPqP2fCh2AMBHeUU2Mc+eQha8d1 +fqXN5KSegHpThmOc4880AlUdY4jvbfIBmeS8mZmW/4KNxtQFZhSo3PFxw65NcLRvCJ4ce2 +N/9KZsCIrh2lWvZAnkU7kjzUVDF42rBbQj4R9sGwU0X0ICzjf+OOTzCLZGyfylZBhV4ZEH +ppKnNFwHyn+SiiQZegIhWpLvBN9E8pB/Ya/jHbdvZTuelkdRpAaA2/wxLOg9igJ6lS0ISE +QZIoXK3KA52E+zA+vPr+Xw4cefuZQNULAl00wHPdFNfLemyiBkxjVqT0AJrn15ek8wqIyP +ec9f55JjANrfVmIndpHDhNwbCfXOUXpKEsuosK6RCQvTzRwADxeohTy461eqLLrzsfXwWx +fkL/WqA1nYrUtm3kpQwyh3w12BhMQCCCzEmd844oMv4xnn+QtFuuQG5ILiHm0xh4KkiBGp +EAAAdItuAA4LbgAOAAAAAHc3NoLXJzYQAAAgEAxQNXFYVbDZWQc2Vxx1JKOsOnNyP+IS/8 +u9s3iMvVWrYo5GPQ4ZZXt5zs4qUc9GdLl0HCUuxJVaTGCF6e0gDqf0vBfDSZOMg7iMmC0T +DgcNSiXT+Kn5wcBMQEm0DnD2/MnsTpzUcMsqcZkuocgstaL5uXKvcSsuqsBaSKFPTFIBNm +VmXs9RJNfQGkQ5SLoQha1eHcqN16ygQcZ0qn35CJWvfKYoxuiUB3DjRvyCMJqIZFPqP2fC +h2AMBHeUU2Mc+eQha8d1fqXN5KSegHpThmOc4880AlUdY4jvbfIBmeS8mZmW/4KNxtQFZh +So3PFxw65NcLRvCJ4ce2N/9KZsCIrh2lWvZAnkU7kjzUVDF42rBbQj4R9sGwU0X0ICzjf+ +OOTzCLZGyfylZBhV4ZEHppKnNFwHyn+SiiQZegIhWpLvBN9E8pB/Ya/jHbdvZTuelkdRpA +aA2/wxLOg9igJ6lS0ISEQZIoXK3KA52E+zA+vPr+Xw4cefuZQNULAl00wHPdFNfLemyiBk +xjVqT0AJrn15ek8wqIyPec9f55JjANrfVmIndpHDhNwbCfXOUXpKEsuosK6RCQvTzRwADx +eohTy461eqLLrzsfXwWxfkL/WqA1nYrUtm3kpQwyh3w12BhMQCCCzEmd844oMv4xnn+QtF +uuQG5ILiHm0xh4KkiBGpEAAAADAQABAAACABpgmJu+h5LZiAYTOnkT2PFmObClxoQd/yoN +rzFHDTFAe1gczx4s+WCRh5vOvIIyhEnjmYdtsGHhlkwPkxcN3VeexnCBQFR8ZpApXrTwZN +Rme7idZct55Lx0nCNHPMhx0QUe2yjLTvVqbv+fDaMrY89E9yfe/adryQ1WWtB0dyIUxtph +eijTwwEuI5aSwGEWk8bYHymSwbpjc4QW2EQT/3fo/jVUlQYWVfpWZfL3Ufc4xvOck0dLSY +VPOSKQ9DEWGZvCnIgkArJdZrffc4qY8wLhTILK/1QmKNtnTTdohquh+ckz1xdtb8kx54PK +WcQ/2NjDu/RLB0Lt8MUtjoIUXBgrlZAcG19pWMzmkdsTnbBDG1EofbZN14Tx+tCNiNTg7a +yaSGmf3UQ/Xsh9p2LVlAh4g0PMQea4Uo1qpWc3WswQBIMzTT2yVknjt7E7JwitlQB5/5W7 +XORM7V3wXHczQKGlIcGTHvlLlFByeaIB4sKZhzrLDFqldtsGJnp7P0gfrFYDIdmzUY/ZJv +nmFNCN3A/+VwmiF7Qxo4Vx272DOvEWGftPb7/Mpue7OQxuw84uAz5oPXHWa4z35WjUec6Q +y5zuzgxp8x4sv1F867Bq4o4pG2sJMwMtII5C0wNLQfKXYhaQqXPj5syrSMSPC2qocgmCX/ +di+SRUK8X+YjyrHtqZAAABADwDDy4fNEYj7lMmsxC7zF0dHLLagGefd55vRYZCrAbVSZtY +eT1GvN8g0F3NLQ3uBgcOGK3+qAoJDKh4Jb0jdkGp8W3Hp4CIVxB9jf0KSyVi/+XLwuj5vg +O/wHYdtjo8sTrAB2RrAiPXMPI2e7wu4LaUEpa5ezNciRxcnb4AurqAaz1sx0f5QWs/PMSs +NWuCQ4vvy20e5DiSwIV2SH4HyCFA7vINgwqJn/kZJ3kGP18rSszzByKZ19ZbzxNCQ1jfCq +9JYzE9n4p+fxQ7xZjIcuQXK/hihkQEKhFQwlM/9eqelGsps07t1Ux8SCrdavDZhXjoX5NK +ST0XixGKoAZbePMAAAEBAOvTQ8ns+Y8tsrgUthX8bz1Kxmto5AEO9Nd0UVwjUOgA5pQYwm +C36RZowj4pxAoU9roa1jLqbvu9kNGXMuh0aaSb605G/4F3P/bAfwEmtXNlzXW9/GSbPYl+ +u/oXkUGneswTvwpgOUZ1ASZWFcEpiJM1Xu6R8/O7R3QCjsR9oNOoTw1FuktK2/kOqw0oDq +5bwKVdmEmgUguGLqnsdynCDhBmdVQQCdDPwjDhRGk9VfWUtRK/nl27+mwkyORHuw5nQh94 +hWNx4EkVQvdYFUsNPYeebC8ATLlFvWaf9xc+zAR876OBhzur+hyrw9vyaOS/MZ3/dgClmf +RfajBiqv/JrjUAAAEBANXeD7bAC1RTKFghuvowaBmrIpDyT0LCDTULkml80efFFs3tzMQQ +fST5qV1aSQp3eUa4VYlO0c8lB65zqX+Ce17Y0UxgSjNCA2fbrId0Lmlt8WIxHc67S6wRvj +haW3MYrD9G12BOVU6D4RSVGS0QyPkVeXwnfxPjJzLrz981yuMT1AAfLKwtxmwqB2RPcwyq +fqdEijQgbeWiiov2gb7CLzP9QeB9m3V2FI9X3/n06rwuq9Bv/gPL1ij20PulpcjHrn1fyX ++5u89wBvSJ1Ne1KjDrrkUdgETI0ZQ7+4ERivsfRXAnFGEl55XiYLKI6k6TxtqF/u5mbMCv +21P/Swyv9m0AAAANdHJveUBjb3VudGFjaAECAwQFBg== +-----END OPENSSH PRIVATE KEY----- diff --git a/server/provision/users/shinobi/ssh/id_rsa.pub b/server/provision/users/shinobi/ssh/id_rsa.pub new file mode 100644 index 0000000..7cf66e9 --- /dev/null +++ b/server/provision/users/shinobi/ssh/id_rsa.pub @@ -0,0 +1 @@ +ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQDFA1cVhVsNlZBzZXHHUko6w6c3I/4hL/y72zeIy9VatijkY9Dhlle3nOzipRz0Z0uXQcJS7ElVpMYIXp7SAOp/S8F8NJk4yDuIyYLRMOBw1KJdP4qfnBwExASbQOcPb8yexOnNRwyypxmS6hyCy1ovm5cq9xKy6qwFpIoU9MUgE2ZWZez1Ek19AaRDlIuhCFrV4dyo3XrKBBxnSqffkIla98pijG6JQHcONG/IIwmohkU+o/Z8KHYAwEd5RTYxz55CFrx3V+pc3kpJ6AelOGY5zjzzQCVR1jiO9t8gGZ5LyZmZb/go3G1AVmFKjc8XHDrk1wtG8Inhx7Y3/0pmwIiuHaVa9kCeRTuSPNRUMXjasFtCPhH2wbBTRfQgLON/445PMItkbJ/KVkGFXhkQemkqc0XAfKf5KKJBl6AiFaku8E30TykH9hr+Mdt29lO56WR1GkBoDb/DEs6D2KAnqVLQhIRBkihcrcoDnYT7MD68+v5fDhx5+5lA1QsCXTTAc90U18t6bKIGTGNWpPQAmufXl6TzCojI95z1/nkmMA2t9WYid2kcOE3BsJ9c5RekoSy6iwrpEJC9PNHAAPF6iFPLjrV6osuvOx9fBbF+Qv9aoDWditS2beSlDDKHfDXYGExAIILMSZ3zjigy/jGef5C0W65AbkguIebTGHgqSIEakQ== troy@countach diff --git a/server/provision/users/shinobi/ssh/known_hosts b/server/provision/users/shinobi/ssh/known_hosts new file mode 100644 index 0000000..a4854ec --- /dev/null +++ b/server/provision/users/shinobi/ssh/known_hosts @@ -0,0 +1,3 @@ +|1|HNfODkbpMvUeHOSv8tzTZdhzUnM=|C+xjDIr71yL49lJOO3eH2dJXJ6k= ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID0luCnOEpQCpwxpFWlNSBfJ5uwRUhRlLByOvQGMVifV +|1|7OpTeAWOyu7ejBfKMNIe9aTrizU=|ca3+00vKexJwQZlvLVdgeljuBB0= ssh-rsa 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 +|1|A8PuKz/4Ej8eeJqnnr0yrIazths=|kWyDWHoRp7Cuu19ieYtfVaXQfG0= ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBNYr2TApZxXT00eP7rXHOc7FVs+xUtR8kfsYRh6AlY/zcAbH7w+JFsXIvDa3iIn7PbblM25rgt64LiQZYbUCzpc=