shinobi user configured for keylogin
All checks were successful
learn org at code.softwareshinobi.com/linux.softwareshinobi.com/pipeline/head This commit looks good
All checks were successful
learn org at code.softwareshinobi.com/linux.softwareshinobi.com/pipeline/head This commit looks good
This commit is contained in:
@@ -12,7 +12,7 @@ services:
|
||||
|
||||
dockerfile: Dockerfile
|
||||
|
||||
hostname: shinobilinux
|
||||
hostname: asterion
|
||||
|
||||
domainname: linux.softwareshinobi.com
|
||||
|
||||
@@ -20,6 +20,10 @@ services:
|
||||
|
||||
- "2222:22"
|
||||
|
||||
volumes:
|
||||
|
||||
- "./tmp:/tmp"
|
||||
|
||||
linux.softwareshinobi.com-landing:
|
||||
|
||||
container_name: linux.softwareshinobi.com-landing
|
||||
|
||||
22
readme.md
22
readme.md
@@ -64,6 +64,28 @@ Shinobi Academy Linux comes pre-installed with some interesting tools to enhance
|
||||
|
||||
**Experimenting with these tools is a great way to explore the possibilities of Linux.**
|
||||
|
||||
## Issues
|
||||
|
||||
when the container is bounced, the following error/warning is displayed. i want to avoid that as the containers will be bounced often.
|
||||
|
||||
```bash
|
||||
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||||
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
|
||||
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
|
||||
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
|
||||
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
|
||||
It is also possible that a host key has just been changed.
|
||||
The fingerprint for the ED25519 key sent by the remote host is
|
||||
SHA256:1mVaZmiBG+iX+aZxweT3zkZFnctabuzbeWQzojqNuJ4.
|
||||
Please contact your system administrator.
|
||||
Add correct host key in /home/shinobi/.ssh/known_hosts to get rid of this message.
|
||||
Offending ED25519 key in /home/shinobi/.ssh/known_hosts:23
|
||||
remove with:
|
||||
ssh-keygen -f '/home/shinobi/.ssh/known_hosts' -R '[localhost]:2222'
|
||||
Host key for [localhost]:2222 has changed and you have requested strict checking.
|
||||
Host key verification failed.
|
||||
```
|
||||
|
||||
## Conclusion:
|
||||
|
||||
By following these steps, you've successfully connected to Shinobi Academy Linux and begun your journey into the world of Linux. Use this platform to explore, experiment, and build your Linux skills!
|
||||
|
||||
@@ -2,17 +2,17 @@ FROM ubuntu:questing
|
||||
|
||||
##
|
||||
|
||||
ARG DEBIAN_FRONTEND=noninteractive
|
||||
|
||||
##
|
||||
|
||||
WORKDIR /
|
||||
|
||||
COPY /provision /
|
||||
|
||||
##
|
||||
|
||||
ARG DEBIAN_FRONTEND=noninteractive
|
||||
|
||||
##
|
||||
|
||||
COPY /provision/provision.bash provision.bash
|
||||
#COPY /provision/provision.bash provision.bash
|
||||
|
||||
RUN bash provision.bash
|
||||
|
||||
|
||||
94
server/provision/legacy.bash
Executable file
94
server/provision/legacy.bash
Executable file
@@ -0,0 +1,94 @@
|
||||
#!/bin/bash
|
||||
|
||||
##
|
||||
## This script installs stuff
|
||||
## to set up a linux server
|
||||
## suitable for newbies.
|
||||
##
|
||||
## Before you go, check read around my blog!
|
||||
##
|
||||
## https://softwareshinobi.com
|
||||
##
|
||||
##
|
||||
|
||||
set -e;
|
||||
|
||||
set -x;
|
||||
|
||||
##
|
||||
|
||||
cat /etc/issue;
|
||||
|
||||
echo "Shinobi Academy 24.04" > /etc/issue;
|
||||
|
||||
cat /etc/issue;
|
||||
|
||||
##
|
||||
|
||||
apt update;
|
||||
|
||||
##
|
||||
## install bashrc systemwide
|
||||
##
|
||||
|
||||
##cp bashrc /usr/local/bin/bashrc
|
||||
|
||||
##ls -l /tmp/.bashrc
|
||||
|
||||
##cat /tmp/.bashrc;
|
||||
|
||||
##source /tmp/.bashrc;
|
||||
|
||||
##
|
||||
|
||||
apt install -y vim nano;
|
||||
|
||||
apt install -y hollywood;
|
||||
|
||||
apt install -y cmatrix cmatrix-xfont;
|
||||
|
||||
##
|
||||
## shinobi academy user config
|
||||
##
|
||||
|
||||
groupadd -g 4444 shinobi
|
||||
|
||||
useradd -u 4444 -g 4444 -rm -d /home/shinobi -s /bin/bash shinobi
|
||||
|
||||
##useradd -rm -d /home/shinobi -s /bin/bash -u 1042 shinobi;
|
||||
|
||||
echo 'shinobi:shinobi' | chpasswd
|
||||
|
||||
## mkdir /home/shinobi/.ssh/
|
||||
|
||||
## cp /private.key /home/shinobi/.ssh/
|
||||
|
||||
##
|
||||
## restrict permissions on home
|
||||
##
|
||||
|
||||
#chmod -R 555 /home/shinobi/
|
||||
|
||||
#chmod -R 555 /tmp/
|
||||
|
||||
##
|
||||
## change MOTD
|
||||
##
|
||||
|
||||
## echo "hey?" > /etc/motd
|
||||
|
||||
##
|
||||
## start ssh server
|
||||
##
|
||||
|
||||
apt install -y openssh-server;
|
||||
|
||||
apt install -y sudo;
|
||||
|
||||
service ssh start;
|
||||
|
||||
##
|
||||
## finish
|
||||
##
|
||||
|
||||
echo "fin."
|
||||
@@ -1 +0,0 @@
|
||||
the private key!!
|
||||
78
server/provision/provision (copy).bash
Executable file
78
server/provision/provision (copy).bash
Executable file
@@ -0,0 +1,78 @@
|
||||
#!/bin/bash
|
||||
|
||||
##
|
||||
## This script installs stuff
|
||||
## to set up a linux server
|
||||
## suitable for newbies.
|
||||
##
|
||||
## Before you go, check read around my blog!
|
||||
##
|
||||
## https://softwareshinobi.com
|
||||
##
|
||||
##
|
||||
|
||||
set -e;
|
||||
|
||||
set -x;
|
||||
|
||||
##
|
||||
|
||||
cd shinobi
|
||||
|
||||
bash provision.bash
|
||||
|
||||
cd ..
|
||||
|
||||
##
|
||||
|
||||
cat /etc/issue;
|
||||
|
||||
echo "Shinobi Academy 24.04" > /etc/issue;
|
||||
|
||||
cat /etc/issue;
|
||||
|
||||
##
|
||||
|
||||
apt update;
|
||||
|
||||
##
|
||||
## install bashrc systemwide
|
||||
##
|
||||
|
||||
##cp bashrc /usr/local/bin/bashrc
|
||||
|
||||
##ls -l /tmp/.bashrc
|
||||
|
||||
##cat /tmp/.bashrc;
|
||||
|
||||
##source /tmp/.bashrc;
|
||||
|
||||
##
|
||||
|
||||
apt install -y vim nano;
|
||||
|
||||
apt install -y hollywood;
|
||||
|
||||
apt install -y cmatrix cmatrix-xfont;
|
||||
|
||||
##
|
||||
## change MOTD
|
||||
##
|
||||
|
||||
## echo "hey?" > /etc/motd
|
||||
|
||||
##
|
||||
## start ssh server
|
||||
##
|
||||
|
||||
apt install -y openssh-server;
|
||||
|
||||
apt install -y sudo;
|
||||
|
||||
service ssh start;
|
||||
|
||||
##
|
||||
## finish
|
||||
##
|
||||
|
||||
echo "fin."
|
||||
@@ -17,78 +17,16 @@ set -x;
|
||||
|
||||
##
|
||||
|
||||
cat /etc/issue;
|
||||
cd server
|
||||
|
||||
echo "Shinobi Academy 24.04" > /etc/issue;
|
||||
bash sshd.bash
|
||||
|
||||
cat /etc/issue;
|
||||
cd ..
|
||||
|
||||
##
|
||||
|
||||
apt update;
|
||||
cd users/shinobi
|
||||
|
||||
##
|
||||
## install bashrc systemwide
|
||||
##
|
||||
bash provision.bash
|
||||
|
||||
##cp bashrc /usr/local/bin/bashrc
|
||||
|
||||
##ls -l /tmp/.bashrc
|
||||
|
||||
##cat /tmp/.bashrc;
|
||||
|
||||
##source /tmp/.bashrc;
|
||||
|
||||
##
|
||||
|
||||
apt install -y vim nano;
|
||||
|
||||
## apt install -y hollywood;
|
||||
|
||||
apt install -y cmatrix cmatrix-xfont;
|
||||
|
||||
##
|
||||
## shinobi academy user config
|
||||
##
|
||||
|
||||
groupadd -g 1042 shinobi
|
||||
|
||||
useradd -u 1042 -g 1042 -rm -d /home/shinobi -s /bin/bash shinobi
|
||||
|
||||
##useradd -rm -d /home/shinobi -s /bin/bash -u 1042 shinobi;
|
||||
|
||||
echo 'shinobi:shinobi' | chpasswd
|
||||
|
||||
mkdir /home/shinobi/.ssh/
|
||||
|
||||
cp /private.key /home/shinobi/.ssh/
|
||||
|
||||
##
|
||||
## restrict permissions on home
|
||||
##
|
||||
|
||||
chmod -R 555 /home/shinobi/
|
||||
|
||||
chmod -R 555 /tmp/
|
||||
|
||||
##
|
||||
## change MOTD
|
||||
##
|
||||
|
||||
## echo "hey?" > /etc/motd
|
||||
|
||||
##
|
||||
## start ssh server
|
||||
##
|
||||
|
||||
apt install -y openssh-server;
|
||||
|
||||
apt install -y sudo;
|
||||
|
||||
service ssh start;
|
||||
|
||||
##
|
||||
## finish
|
||||
##
|
||||
|
||||
echo "fin."
|
||||
cd ../..
|
||||
|
||||
21
server/provision/server/sshd.bash
Executable file
21
server/provision/server/sshd.bash
Executable file
@@ -0,0 +1,21 @@
|
||||
#!/bin/bash
|
||||
|
||||
set -e;
|
||||
|
||||
set -x;
|
||||
|
||||
apt update;
|
||||
|
||||
apt install -y openssh-server;
|
||||
|
||||
apt install -y sudo;
|
||||
|
||||
cp sshd_config /etc/ssh/sshd_config
|
||||
|
||||
service ssh start;
|
||||
|
||||
##
|
||||
## finish
|
||||
##
|
||||
|
||||
echo "fin."
|
||||
144
server/provision/server/sshd_config
Normal file
144
server/provision/server/sshd_config
Normal file
@@ -0,0 +1,144 @@
|
||||
## revuelto!!
|
||||
|
||||
# This is the sshd server system-wide configuration file. See
|
||||
# sshd_config(5) for more information.
|
||||
|
||||
# This sshd was compiled with PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games
|
||||
|
||||
# The strategy used for options in the default sshd_config shipped with
|
||||
# OpenSSH is to specify options with their default value where
|
||||
# possible, but leave them commented. Uncommented options override the
|
||||
# default value.
|
||||
#
|
||||
# In general, the first uncommented definition of an option takes precedence.
|
||||
# For options that accept multiple values, like 'Port', subsequent definitions
|
||||
# are appended to the configuration.
|
||||
#
|
||||
# Note that the above implies that configuration options from snippets in
|
||||
# /etc/ssh/sshd_config.d/*.conf take precedence over those defined in this
|
||||
# file. In addition, configuration snippet files are processed in lexical
|
||||
# order, so options defined in files with names that sort earlier take
|
||||
# precedence.
|
||||
#
|
||||
# Such configuration snippets may be present in default installations of
|
||||
# Ubuntu.
|
||||
Include /etc/ssh/sshd_config.d/*.conf
|
||||
|
||||
# When systemd socket activation is used (the default), the socket
|
||||
# configuration must be re-generated after changing Port, AddressFamily, or
|
||||
# ListenAddress.
|
||||
#
|
||||
# For changes to take effect, run:
|
||||
#
|
||||
# systemctl daemon-reload
|
||||
# systemctl restart ssh.socket
|
||||
#
|
||||
#Port 22
|
||||
#AddressFamily any
|
||||
#ListenAddress 0.0.0.0
|
||||
#ListenAddress ::
|
||||
|
||||
#HostKey /etc/ssh/ssh_host_rsa_key
|
||||
#HostKey /etc/ssh/ssh_host_ecdsa_key
|
||||
#HostKey /etc/ssh/ssh_host_ed25519_key
|
||||
|
||||
# Ciphers and keying
|
||||
#RekeyLimit default none
|
||||
|
||||
# Logging
|
||||
#SyslogFacility AUTH
|
||||
#LogLevel INFO
|
||||
|
||||
# Authentication:
|
||||
|
||||
#LoginGraceTime 2m
|
||||
#PermitRootLogin prohibit-password
|
||||
#StrictModes yes
|
||||
#MaxAuthTries 6
|
||||
#MaxSessions 10
|
||||
|
||||
PubkeyAuthentication yes
|
||||
|
||||
# Expect .ssh/authorized_keys2 to be disregarded by default in future.
|
||||
AuthorizedKeysFile .ssh/authorized_keys .ssh/authorized_keys2
|
||||
|
||||
#AuthorizedPrincipalsFile none
|
||||
|
||||
#AuthorizedKeysCommand none
|
||||
#AuthorizedKeysCommandUser nobody
|
||||
|
||||
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
|
||||
#HostbasedAuthentication no
|
||||
# Change to yes if you don't trust ~/.ssh/known_hosts for
|
||||
# HostbasedAuthentication
|
||||
#IgnoreUserKnownHosts no
|
||||
# Don't read the user's ~/.rhosts and ~/.shosts files
|
||||
#IgnoreRhosts yes
|
||||
|
||||
# To disable tunneled clear text passwords, change to no here!
|
||||
#PasswordAuthentication yes
|
||||
#PermitEmptyPasswords no
|
||||
|
||||
# Change to yes to enable challenge-response passwords (beware issues with
|
||||
# some PAM modules and threads)
|
||||
KbdInteractiveAuthentication no
|
||||
|
||||
# Kerberos options
|
||||
#KerberosAuthentication no
|
||||
#KerberosOrLocalPasswd yes
|
||||
#KerberosTicketCleanup yes
|
||||
#KerberosGetAFSToken no
|
||||
|
||||
# GSSAPI options
|
||||
#GSSAPIAuthentication no
|
||||
#GSSAPICleanupCredentials yes
|
||||
#GSSAPIStrictAcceptorCheck yes
|
||||
#GSSAPIKeyExchange no
|
||||
|
||||
# Set this to 'yes' to enable PAM authentication, account processing,
|
||||
# and session processing. If this is enabled, PAM authentication will
|
||||
# be allowed through the KbdInteractiveAuthentication and
|
||||
# PasswordAuthentication. Depending on your PAM configuration,
|
||||
# PAM authentication via KbdInteractiveAuthentication may bypass
|
||||
# the setting of "PermitRootLogin prohibit-password".
|
||||
# If you just want the PAM account and session checks to run without
|
||||
# PAM authentication, then enable this but set PasswordAuthentication
|
||||
# and KbdInteractiveAuthentication to 'no'.
|
||||
UsePAM yes
|
||||
|
||||
#AllowAgentForwarding yes
|
||||
#AllowTcpForwarding yes
|
||||
#GatewayPorts no
|
||||
X11Forwarding yes
|
||||
#X11DisplayOffset 10
|
||||
#X11UseLocalhost yes
|
||||
#PermitTTY yes
|
||||
PrintMotd yes
|
||||
#PrintLastLog yes
|
||||
#TCPKeepAlive yes
|
||||
#PermitUserEnvironment no
|
||||
#Compression delayed
|
||||
#ClientAliveInterval 0
|
||||
#ClientAliveCountMax 3
|
||||
#UseDNS no
|
||||
#PidFile /run/sshd.pid
|
||||
#MaxStartups 10:30:100
|
||||
#PermitTunnel no
|
||||
#ChrootDirectory none
|
||||
#VersionAddendum none
|
||||
|
||||
# no default banner path
|
||||
#Banner none
|
||||
|
||||
# Allow client to pass locale environment variables
|
||||
AcceptEnv LANG LC_*
|
||||
|
||||
# override default of no subsystems
|
||||
Subsystem sftp /usr/lib/openssh/sftp-server
|
||||
|
||||
# Example of overriding settings on a per-user basis
|
||||
#Match User anoncvs
|
||||
# X11Forwarding no
|
||||
# AllowTcpForwarding no
|
||||
# PermitTTY no
|
||||
# ForceCommand cvs server
|
||||
2
server/provision/users/shinobi/bashrc/.bashrc
Normal file
2
server/provision/users/shinobi/bashrc/.bashrc
Normal file
@@ -0,0 +1,2 @@
|
||||
|
||||
alias a="ls -lha"
|
||||
48
server/provision/users/shinobi/provision.bash
Executable file
48
server/provision/users/shinobi/provision.bash
Executable file
@@ -0,0 +1,48 @@
|
||||
#!/bin/bash
|
||||
|
||||
##
|
||||
## This script installs stuff
|
||||
## to set up a linux server
|
||||
## suitable for newbies.
|
||||
##
|
||||
## Before you go, check read around my blog!
|
||||
##
|
||||
## https://softwareshinobi.com
|
||||
##
|
||||
##
|
||||
|
||||
set -e;
|
||||
|
||||
set -x;
|
||||
|
||||
##
|
||||
## create user
|
||||
##
|
||||
|
||||
groupadd -g 4444 shinobi
|
||||
|
||||
useradd -u 4444 -g 4444 -rm -d /home/shinobi -s /bin/bash shinobi
|
||||
|
||||
##
|
||||
## set password
|
||||
##
|
||||
|
||||
echo 'shinobi:shinobi' | chpasswd
|
||||
|
||||
##
|
||||
## set up keys
|
||||
##
|
||||
|
||||
cp -r ssh/ /home/shinobi/.ssh
|
||||
|
||||
chmod -R 700 /home/shinobi/.ssh
|
||||
|
||||
chown -R shinobi: /home/shinobi/.ssh
|
||||
|
||||
##
|
||||
## restrict permissions on home
|
||||
##
|
||||
|
||||
#chmod -R 555 /home/shinobi/
|
||||
|
||||
#chmod -R 555 /tmp/
|
||||
1
server/provision/users/shinobi/ssh/authorized_keys
Normal file
1
server/provision/users/shinobi/ssh/authorized_keys
Normal file
@@ -0,0 +1 @@
|
||||
ssh-rsa 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 troy@countach
|
||||
49
server/provision/users/shinobi/ssh/id_rsa
Normal file
49
server/provision/users/shinobi/ssh/id_rsa
Normal file
@@ -0,0 +1,49 @@
|
||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAACFwAAAAdzc2gtcn
|
||||
NhAAAAAwEAAQAAAgEAxQNXFYVbDZWQc2Vxx1JKOsOnNyP+IS/8u9s3iMvVWrYo5GPQ4ZZX
|
||||
t5zs4qUc9GdLl0HCUuxJVaTGCF6e0gDqf0vBfDSZOMg7iMmC0TDgcNSiXT+Kn5wcBMQEm0
|
||||
DnD2/MnsTpzUcMsqcZkuocgstaL5uXKvcSsuqsBaSKFPTFIBNmVmXs9RJNfQGkQ5SLoQha
|
||||
1eHcqN16ygQcZ0qn35CJWvfKYoxuiUB3DjRvyCMJqIZFPqP2fCh2AMBHeUU2Mc+eQha8d1
|
||||
fqXN5KSegHpThmOc4880AlUdY4jvbfIBmeS8mZmW/4KNxtQFZhSo3PFxw65NcLRvCJ4ce2
|
||||
N/9KZsCIrh2lWvZAnkU7kjzUVDF42rBbQj4R9sGwU0X0ICzjf+OOTzCLZGyfylZBhV4ZEH
|
||||
ppKnNFwHyn+SiiQZegIhWpLvBN9E8pB/Ya/jHbdvZTuelkdRpAaA2/wxLOg9igJ6lS0ISE
|
||||
QZIoXK3KA52E+zA+vPr+Xw4cefuZQNULAl00wHPdFNfLemyiBkxjVqT0AJrn15ek8wqIyP
|
||||
ec9f55JjANrfVmIndpHDhNwbCfXOUXpKEsuosK6RCQvTzRwADxeohTy461eqLLrzsfXwWx
|
||||
fkL/WqA1nYrUtm3kpQwyh3w12BhMQCCCzEmd844oMv4xnn+QtFuuQG5ILiHm0xh4KkiBGp
|
||||
EAAAdItuAA4LbgAOAAAAAHc3NoLXJzYQAAAgEAxQNXFYVbDZWQc2Vxx1JKOsOnNyP+IS/8
|
||||
u9s3iMvVWrYo5GPQ4ZZXt5zs4qUc9GdLl0HCUuxJVaTGCF6e0gDqf0vBfDSZOMg7iMmC0T
|
||||
DgcNSiXT+Kn5wcBMQEm0DnD2/MnsTpzUcMsqcZkuocgstaL5uXKvcSsuqsBaSKFPTFIBNm
|
||||
VmXs9RJNfQGkQ5SLoQha1eHcqN16ygQcZ0qn35CJWvfKYoxuiUB3DjRvyCMJqIZFPqP2fC
|
||||
h2AMBHeUU2Mc+eQha8d1fqXN5KSegHpThmOc4880AlUdY4jvbfIBmeS8mZmW/4KNxtQFZh
|
||||
So3PFxw65NcLRvCJ4ce2N/9KZsCIrh2lWvZAnkU7kjzUVDF42rBbQj4R9sGwU0X0ICzjf+
|
||||
OOTzCLZGyfylZBhV4ZEHppKnNFwHyn+SiiQZegIhWpLvBN9E8pB/Ya/jHbdvZTuelkdRpA
|
||||
aA2/wxLOg9igJ6lS0ISEQZIoXK3KA52E+zA+vPr+Xw4cefuZQNULAl00wHPdFNfLemyiBk
|
||||
xjVqT0AJrn15ek8wqIyPec9f55JjANrfVmIndpHDhNwbCfXOUXpKEsuosK6RCQvTzRwADx
|
||||
eohTy461eqLLrzsfXwWxfkL/WqA1nYrUtm3kpQwyh3w12BhMQCCCzEmd844oMv4xnn+QtF
|
||||
uuQG5ILiHm0xh4KkiBGpEAAAADAQABAAACABpgmJu+h5LZiAYTOnkT2PFmObClxoQd/yoN
|
||||
rzFHDTFAe1gczx4s+WCRh5vOvIIyhEnjmYdtsGHhlkwPkxcN3VeexnCBQFR8ZpApXrTwZN
|
||||
Rme7idZct55Lx0nCNHPMhx0QUe2yjLTvVqbv+fDaMrY89E9yfe/adryQ1WWtB0dyIUxtph
|
||||
eijTwwEuI5aSwGEWk8bYHymSwbpjc4QW2EQT/3fo/jVUlQYWVfpWZfL3Ufc4xvOck0dLSY
|
||||
VPOSKQ9DEWGZvCnIgkArJdZrffc4qY8wLhTILK/1QmKNtnTTdohquh+ckz1xdtb8kx54PK
|
||||
WcQ/2NjDu/RLB0Lt8MUtjoIUXBgrlZAcG19pWMzmkdsTnbBDG1EofbZN14Tx+tCNiNTg7a
|
||||
yaSGmf3UQ/Xsh9p2LVlAh4g0PMQea4Uo1qpWc3WswQBIMzTT2yVknjt7E7JwitlQB5/5W7
|
||||
XORM7V3wXHczQKGlIcGTHvlLlFByeaIB4sKZhzrLDFqldtsGJnp7P0gfrFYDIdmzUY/ZJv
|
||||
nmFNCN3A/+VwmiF7Qxo4Vx272DOvEWGftPb7/Mpue7OQxuw84uAz5oPXHWa4z35WjUec6Q
|
||||
y5zuzgxp8x4sv1F867Bq4o4pG2sJMwMtII5C0wNLQfKXYhaQqXPj5syrSMSPC2qocgmCX/
|
||||
di+SRUK8X+YjyrHtqZAAABADwDDy4fNEYj7lMmsxC7zF0dHLLagGefd55vRYZCrAbVSZtY
|
||||
eT1GvN8g0F3NLQ3uBgcOGK3+qAoJDKh4Jb0jdkGp8W3Hp4CIVxB9jf0KSyVi/+XLwuj5vg
|
||||
O/wHYdtjo8sTrAB2RrAiPXMPI2e7wu4LaUEpa5ezNciRxcnb4AurqAaz1sx0f5QWs/PMSs
|
||||
NWuCQ4vvy20e5DiSwIV2SH4HyCFA7vINgwqJn/kZJ3kGP18rSszzByKZ19ZbzxNCQ1jfCq
|
||||
9JYzE9n4p+fxQ7xZjIcuQXK/hihkQEKhFQwlM/9eqelGsps07t1Ux8SCrdavDZhXjoX5NK
|
||||
ST0XixGKoAZbePMAAAEBAOvTQ8ns+Y8tsrgUthX8bz1Kxmto5AEO9Nd0UVwjUOgA5pQYwm
|
||||
C36RZowj4pxAoU9roa1jLqbvu9kNGXMuh0aaSb605G/4F3P/bAfwEmtXNlzXW9/GSbPYl+
|
||||
u/oXkUGneswTvwpgOUZ1ASZWFcEpiJM1Xu6R8/O7R3QCjsR9oNOoTw1FuktK2/kOqw0oDq
|
||||
5bwKVdmEmgUguGLqnsdynCDhBmdVQQCdDPwjDhRGk9VfWUtRK/nl27+mwkyORHuw5nQh94
|
||||
hWNx4EkVQvdYFUsNPYeebC8ATLlFvWaf9xc+zAR876OBhzur+hyrw9vyaOS/MZ3/dgClmf
|
||||
RfajBiqv/JrjUAAAEBANXeD7bAC1RTKFghuvowaBmrIpDyT0LCDTULkml80efFFs3tzMQQ
|
||||
fST5qV1aSQp3eUa4VYlO0c8lB65zqX+Ce17Y0UxgSjNCA2fbrId0Lmlt8WIxHc67S6wRvj
|
||||
haW3MYrD9G12BOVU6D4RSVGS0QyPkVeXwnfxPjJzLrz981yuMT1AAfLKwtxmwqB2RPcwyq
|
||||
fqdEijQgbeWiiov2gb7CLzP9QeB9m3V2FI9X3/n06rwuq9Bv/gPL1ij20PulpcjHrn1fyX
|
||||
+5u89wBvSJ1Ne1KjDrrkUdgETI0ZQ7+4ERivsfRXAnFGEl55XiYLKI6k6TxtqF/u5mbMCv
|
||||
21P/Swyv9m0AAAANdHJveUBjb3VudGFjaAECAwQFBg==
|
||||
-----END OPENSSH PRIVATE KEY-----
|
||||
1
server/provision/users/shinobi/ssh/id_rsa.pub
Normal file
1
server/provision/users/shinobi/ssh/id_rsa.pub
Normal file
@@ -0,0 +1 @@
|
||||
ssh-rsa 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 troy@countach
|
||||
3
server/provision/users/shinobi/ssh/known_hosts
Normal file
3
server/provision/users/shinobi/ssh/known_hosts
Normal file
@@ -0,0 +1,3 @@
|
||||
|1|HNfODkbpMvUeHOSv8tzTZdhzUnM=|C+xjDIr71yL49lJOO3eH2dJXJ6k= ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID0luCnOEpQCpwxpFWlNSBfJ5uwRUhRlLByOvQGMVifV
|
||||
|1|7OpTeAWOyu7ejBfKMNIe9aTrizU=|ca3+00vKexJwQZlvLVdgeljuBB0= ssh-rsa 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
|
||||
|1|A8PuKz/4Ej8eeJqnnr0yrIazths=|kWyDWHoRp7Cuu19ieYtfVaXQfG0= ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBNYr2TApZxXT00eP7rXHOc7FVs+xUtR8kfsYRh6AlY/zcAbH7w+JFsXIvDa3iIn7PbblM25rgt64LiQZYbUCzpc=
|
||||
Reference in New Issue
Block a user