├── dropbear ├── dropbear_config └── Dockerfile ├── .gitignore ├── pass ├── bash_logout ├── sshd_config ├── sshd_config_export_key ├── Dockerfile └── entrypoint.sh ├── http-proxy ├── squid-passwords ├── squid.conf ├── authenticated-squid.conf └── Dockerfile ├── yubikey-pam ├── yubico_passw ├── pam_sshd ├── sshd_config ├── README.md ├── entrypoint.sh └── Dockerfile ├── keyboard-interactive-custom ├── pam_sshd ├── Dockerfile └── termius-pam.c ├── keys ├── id_ed25519.pub ├── id_ed25519_aes128-gcm.pub ├── id_ed25519_aes256-gcm.pub ├── ssh_host_ed25519_key.pub ├── id_ecdsa_nistp256.pub ├── id_ecdsa_nistp256_openssh.pub ├── ssh_host_ecdsa_sha2_nistp256_key.pub ├── id_ecdsa_nistp384.pub ├── id_ecdsa_nistp256 ├── id_ecdsa_nistp521.pub ├── id_ecdsa_nistp384 ├── putty_rsa.pub ├── id_ecdsa_nistp521 ├── putty_rsa_encrypted.pub ├── id_rsa1.pub ├── putty3_rsa_encrypted.pub ├── id_ed25519 ├── ssh_host_ed25519_key ├── id_ed25519_aes128-gcm ├── id_ed25519_aes256-gcm ├── id_ecdsa_nistp256_openssh ├── id_rsa_encrypted.pub ├── ssh_host_ecdsa_sha2_nistp256_key ├── id_rsa_pkcs8.pub ├── ssh_host_rsa_key.pub ├── id_rsa_pkcs8_encrypted.pub ├── id_dsa_legacy.pub ├── id_dsa.pub ├── id_dsa_legacy ├── id_rsa.pub ├── id_dsa ├── putty_rsa ├── putty_rsa_encrypted ├── putty3_rsa_encrypted ├── id_rsa1 ├── id_mldsa44.pub ├── id_mldsa44_aes128-ctr.pub ├── id_mldsa65.pub ├── id_rsa_pkcs8 ├── id_mldsa65_aes128-ctr.pub ├── ssh_host_rsa_key ├── id_rsa_pkcs8_encrypted ├── id_rsa_encrypted ├── id_rsa ├── id_mldsa87.pub ├── id_mldsa87_aes128-ctr.pub ├── id_mldsa44 ├── id_mldsa44_aes128-ctr ├── id_mldsa65 └── id_mldsa65_aes128-ctr ├── client-cert ├── user-key_ed25519.pub ├── user-key_ecdsa-sha2-nistp256.pub ├── user-key_ecdsa-sha2-nistp384.pub ├── sshd_config ├── user-key_ecdsa-sha2-nistp521.pub ├── sshd_config_sha1 ├── user-key_ed25519 ├── ca.pub ├── user-key.pub ├── user-key_ecdsa-sha2-nistp256 ├── entrypoint.sh ├── user-key_ssh-dss.pub ├── user-key_ecdsa-sha2-nistp384 ├── Dockerfile ├── user-key_ecdsa-sha2-nistp521 ├── Dockerfile_sha1 ├── user-key_ssh-dss ├── user-key_ed25519-cert.pub ├── user-key_ecdsa-sha2-nistp256-cert.pub ├── user-key_ecdsa-sha2-nistp384-cert.pub ├── user-key_ecdsa-sha2-nistp521-cert.pub ├── user-key-cert.pub ├── exp-user-key-cert.pub ├── user-key_ssh-dss-cert.pub ├── ca └── user-key ├── authypass ├── sshd_config ├── set_password.sh ├── Dockerfile └── entrypoint.sh ├── telnet ├── entrypoint.sh ├── telnet └── Dockerfile ├── keyboard-interactive-pass ├── sshd_config ├── Dockerfile └── entrypoint.sh ├── mosh ├── sshd_config ├── Dockerfile └── entrypoint.sh ├── authykey ├── sshd_config ├── id_rsa.pub ├── Dockerfile ├── entrypoint.sh └── id_rsa ├── keyboard-interactive-edgecases ├── sshd_config ├── Dockerfile └── entrypoint.sh ├── gateway-ports ├── sshd_config ├── Dockerfile ├── run_http.py └── entrypoint.sh ├── agent-forwarding-disabled ├── sshd_config ├── Dockerfile └── entrypoint.sh ├── sshd_configs_raw ├── sshd_config_macs ├── sshd_config_ciphers ├── sshd_config_kex ├── sshd_config_no_pf ├── sshd_config_no_sftp ├── sshd_config_ciphers_macs ├── sshd_config_oqs ├── sshd_config ├── sshd_config_mldsa ├── sshd_config_key ├── sshd_config_dsa ├── sshd_config_key_limit_channels ├── sshd_config_rsa_sha2_256 ├── sshd_config_rsa_sha2_512 └── sshd_config_rsa_sha2 ├── multiple-auths ├── sshd_config ├── Dockerfile └── entrypoint.sh ├── otp ├── sshd_config ├── Dockerfile ├── otp.pam_sshd ├── README.md ├── entrypoint.sh ├── pass_otp.pam_sshd ├── keys.txt └── otpw ├── sanitize-auth-log.sh ├── socks5 ├── Dockerfile └── danted.conf ├── rocky ├── Dockerfile ├── sshd_config └── entrypoint.sh ├── .github └── pull_request_template.md ├── sftp-disabled └── Dockerfile ├── raspbian └── Dockerfile ├── Dockerfile ├── hostkey-order ├── Dockerfile └── entrypoint.sh ├── tinyssh └── Dockerfile ├── ubuntu-old ├── Dockerfile └── entrypoint.sh ├── anomaly-exec ├── Dockerfile └── bashrc ├── CONTRIBUTING.md ├── oqs ├── Dockerfile └── entrypoint.sh ├── openssh10 ├── Dockerfile └── entrypoint.sh └── entrypoint.sh /dropbear/dropbear_config: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /.gitignore: -------------------------------------------------------------------------------- 1 | *~ 2 | .DS_Store 3 | .idea 4 | -------------------------------------------------------------------------------- /pass/bash_logout: -------------------------------------------------------------------------------- 1 | > $HOME/.ssh/authorized_keys -------------------------------------------------------------------------------- /http-proxy/squid-passwords: -------------------------------------------------------------------------------- 1 | termius:OPOYbA7uo8/wA 2 | -------------------------------------------------------------------------------- /yubikey-pam/yubico_passw: -------------------------------------------------------------------------------- 1 | sa:cccccchvtbdr:ccccccundggr:ccccccllllib 2 | 3 | -------------------------------------------------------------------------------- /yubikey-pam/pam_sshd: -------------------------------------------------------------------------------- 1 | auth required pam_yubico.so id=64036 debug authfile=/var/yubico_passw 2 | -------------------------------------------------------------------------------- /http-proxy/squid.conf: -------------------------------------------------------------------------------- 1 | http_access allow all 2 | http_port 3128 3 | 4 | coredump_dir /var/spool/squid 5 | -------------------------------------------------------------------------------- /keyboard-interactive-custom/pam_sshd: -------------------------------------------------------------------------------- 1 | # Copyright (c) 2020 Termius Corporation. 2 | auth required /lib/security/termius-pam.so 3 | -------------------------------------------------------------------------------- /keys/id_ed25519.pub: -------------------------------------------------------------------------------- 1 | ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILMk3zcmiQENMdz/rVxfFuuFiJiVIczZv4otq5r+gI4X ndz@Crystalnixs-MacBook-Air.local 2 | -------------------------------------------------------------------------------- /client-cert/user-key_ed25519.pub: -------------------------------------------------------------------------------- 1 | ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMgAFGfvWFrlSeqiViJndlJB8zHbzfNPXxEH20hH2kqb sherov@Ivans-MacBook-Pro.local 2 | -------------------------------------------------------------------------------- /keys/id_ed25519_aes128-gcm.pub: -------------------------------------------------------------------------------- 1 | ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICawy1sQV8gxDQg4yKIQqNhdnEN+mVvP/rntrfUBkrtM sherov@Ivans-MacBook-Pro.local 2 | -------------------------------------------------------------------------------- /keys/id_ed25519_aes256-gcm.pub: -------------------------------------------------------------------------------- 1 | ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPSISt3AKepBJlbHKFpQkKRAMSzUW+wRafVZS/Qn54t7 sherov@Ivans-MacBook-Pro.local 2 | -------------------------------------------------------------------------------- /keys/ssh_host_ed25519_key.pub: -------------------------------------------------------------------------------- 1 | ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIL2bnQOvyS8rxZY0lamBSx9c/KFnwTu9aUTLYSeTGa7Y sherov@Ivans-MacBook-Pro.local 2 | -------------------------------------------------------------------------------- /authypass/sshd_config: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication no 2 | HostbasedAuthentication no 3 | PasswordAuthentication yes 4 | AllowGroups remote 5 | LogLevel DEBUG3 6 | SyslogFacility AUTH 7 | PrintLastLog no -------------------------------------------------------------------------------- /telnet/entrypoint.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | groupadd remote 4 | useradd -s /bin/bash -d /home/$ADMIN -G remote -m $ADMIN 5 | echo "$ADMIN:$ADMIN_PASS" | chpasswd 6 | 7 | service xinetd start 8 | tail -f /dev/null -------------------------------------------------------------------------------- /yubikey-pam/sshd_config: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication no 2 | HostbasedAuthentication no 3 | PermitEmptyPasswords no 4 | ChallengeResponseAuthentication yes 5 | PasswordAuthentication no 6 | UsePAM yes 7 | PrintLastLog no 8 | -------------------------------------------------------------------------------- /authypass/set_password.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | for admin in $ADMIN_LIST 4 | do 5 | ADMIN_ITEM=($(echo $admin | tr ":" " ")); 6 | echo "Set pass for ${ADMIN_ITEM[0]}" 7 | passwd ${ADMIN_ITEM[0]}; 8 | done 9 | -------------------------------------------------------------------------------- /keyboard-interactive-pass/sshd_config: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication no 2 | HostbasedAuthentication no 3 | PasswordAuthentication no 4 | AllowGroups remote 5 | LogLevel DEBUG3 6 | SyslogFacility AUTHPRIV 7 | UsePAM yes 8 | PrintLastLog no -------------------------------------------------------------------------------- /keys/id_ecdsa_nistp256.pub: -------------------------------------------------------------------------------- 1 | ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBL/1rGJNmgGpJlRXZRhfEdFcw+MDvbS2z0kN7ES+iwwfVZ++UILDFNrCLAj1zFrBs9vOK6GRXxs7t2Vk8P+k270= ndz@Crystalnixs-MacBook-Air.local 2 | -------------------------------------------------------------------------------- /keys/id_ecdsa_nistp256_openssh.pub: -------------------------------------------------------------------------------- 1 | ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBEZ9xyNNH6PMLMnwmJE/afjHM7F2uF+BFlRJTXQIOmVtrp67kguxcMj3jDYQnncFNeVLIUYx86//kI2qmlE253U= sherov@Ivans-MacBook-Pro.local 2 | -------------------------------------------------------------------------------- /mosh/sshd_config: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication yes 2 | PasswordAuthentication yes 3 | HostbasedAuthentication no 4 | AllowGroups remote 5 | AuthorizedKeysFile .ssh/authorized_keys 6 | LogLevel DEBUG3 7 | SyslogFacility AUTH 8 | PrintLastLog no -------------------------------------------------------------------------------- /keys/ssh_host_ecdsa_sha2_nistp256_key.pub: -------------------------------------------------------------------------------- 1 | ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBDMA7x86u+GcXE3S6qV4/Zxlu3A7TJHmBjrZ8lN3Xx+aqacb9h1b2ITW4TnQRn4zG4j6VgJ6ckmP6QkhihV0E6I= sherov@Ivans-MacBook-Pro.local 2 | -------------------------------------------------------------------------------- /authykey/sshd_config: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication yes 2 | HostbasedAuthentication no 3 | PasswordAuthentication no 4 | AllowGroups remote 5 | LogLevel DEBUG3 6 | SyslogFacility AUTH 7 | ForceCommand /usr/local/bin/authy-ssh login 8 | PrintLastLog no -------------------------------------------------------------------------------- /client-cert/user-key_ecdsa-sha2-nistp256.pub: -------------------------------------------------------------------------------- 1 | ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBA157x2ZDn78VqU0vTo8cRU+wiWpfTFjD7e5EUY0mXHVFuHFW7pY8HuZguQFhn6QqVq3JttGrh9xIcyprgfU0eY= sherov@Ivans-MacBook-Pro.local 2 | -------------------------------------------------------------------------------- /keys/id_ecdsa_nistp384.pub: -------------------------------------------------------------------------------- 1 | ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBEJmzxuvi05lEs1jEj1Ko1UNr9xIPc+Dsus3w5FEeu4TK3IOh1muT11Hpjh2nZ3SF1GeK7kvTNL/XZuGnARrZGP2iuC3SjVE60jDJ4FD5UOF50b23J20AWc4wuujVq8utw== vagrant@precise64 2 | -------------------------------------------------------------------------------- /pass/sshd_config: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication no 2 | HostbasedAuthentication no 3 | PasswordAuthentication yes 4 | AllowGroups remote 5 | LogLevel DEBUG3 6 | PrintLastLog no 7 | Subsystem sftp /usr/lib/openssh/sftp-server 8 | AcceptEnv LANG LC_* 9 | -------------------------------------------------------------------------------- /keyboard-interactive-edgecases/sshd_config: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication yes 2 | HostbasedAuthentication no 3 | PasswordAuthentication no 4 | AllowGroups remote 5 | LogLevel DEBUG3 6 | SyslogFacility AUTHPRIV 7 | ${PAM_CONFIG} 8 | ${MAX_AUTH_TRIES} 9 | PrintLastLog no 10 | -------------------------------------------------------------------------------- /keys/id_ecdsa_nistp256: -------------------------------------------------------------------------------- 1 | -----BEGIN EC PRIVATE KEY----- 2 | MHcCAQEEIF0CJQxPprMKChonXQttt+9/B0GdeQp/gCdQj68sxEQOoAoGCCqGSM49 3 | AwEHoUQDQgAEv/WsYk2aAakmVFdlGF8R0VzD4wO9tLbPSQ3sRL6LDB9Vn75QgsMU 4 | 2sIsCPXMWsGz284roZFfGzu3ZWTw/6TbvQ== 5 | -----END EC PRIVATE KEY----- 6 | -------------------------------------------------------------------------------- /gateway-ports/sshd_config: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication yes 2 | HostbasedAuthentication no 3 | PasswordAuthentication no 4 | AllowGroups remote 5 | AuthorizedKeysFile .ssh/authorized_keys 6 | LogLevel DEBUG3 7 | SyslogFacility AUTH 8 | GatewayPorts clientspecified 9 | PrintLastLog no -------------------------------------------------------------------------------- /yubikey-pam/README.md: -------------------------------------------------------------------------------- 1 | # Yubikey PAM Authentication 2 | 3 | We use [this guide](https://developers.yubico.com/yubico-pam/YubiKey_and_SSH_via_PAM.html) to set up this authentication. 4 | 5 | To get Yubico API ID we use [this page](https://upgrade.yubico.com/getapikey/). 6 | -------------------------------------------------------------------------------- /agent-forwarding-disabled/sshd_config: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication yes 2 | HostbasedAuthentication no 3 | PasswordAuthentication no 4 | AllowGroups remote 5 | AuthorizedKeysFile .ssh/authorized_keys 6 | LogLevel DEBUG3 7 | SyslogFacility AUTH 8 | AllowAgentForwarding no 9 | PrintLastLog no -------------------------------------------------------------------------------- /sshd_configs_raw/sshd_config_macs: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication yes 2 | HostbasedAuthentication no 3 | PasswordAuthentication no 4 | AllowGroups remote 5 | AuthorizedKeysFile .ssh/authorized_keys 6 | LogLevel DEBUG3 7 | SyslogFacility AUTHPRIV 8 | MACs $MAC 9 | PrintLastLog no 10 | -------------------------------------------------------------------------------- /client-cert/user-key_ecdsa-sha2-nistp384.pub: -------------------------------------------------------------------------------- 1 | ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBKJ4S2B3rleC1s/4m15qowkHW7CU+BmHqK98ISCvedZ3RSS7WsnER0ihbAmju7zUT+bhO7ROJUKMrJbZ7jsV714c3SzdBF7kI/2bMjptWMoS71KPPnMSVfNe90OmbfKTyg== sherov@Ivans-MacBook-Pro.local 2 | -------------------------------------------------------------------------------- /multiple-auths/sshd_config: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication yes 2 | PasswordAuthentication yes 3 | HostbasedAuthentication no 4 | AllowGroups remote 5 | AuthorizedKeysFile .ssh/authorized_keys 6 | LogLevel DEBUG3 7 | SyslogFacility AUTH 8 | AuthenticationMethods publickey,password 9 | PrintLastLog no -------------------------------------------------------------------------------- /sshd_configs_raw/sshd_config_ciphers: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication yes 2 | HostbasedAuthentication no 3 | PasswordAuthentication no 4 | AllowGroups remote 5 | AuthorizedKeysFile .ssh/authorized_keys 6 | LogLevel DEBUG3 7 | SyslogFacility AUTHPRIV 8 | Ciphers $CIPHER 9 | PrintLastLog no 10 | -------------------------------------------------------------------------------- /sshd_configs_raw/sshd_config_kex: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication yes 2 | HostbasedAuthentication no 3 | PasswordAuthentication no 4 | AllowGroups remote 5 | AuthorizedKeysFile .ssh/authorized_keys 6 | LogLevel DEBUG3 7 | SyslogFacility AUTHPRIV 8 | KexAlgorithms $KEX 9 | PrintLastLog no 10 | -------------------------------------------------------------------------------- /sshd_configs_raw/sshd_config_no_pf: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication yes 2 | HostbasedAuthentication no 3 | PasswordAuthentication no 4 | AllowGroups remote 5 | AuthorizedKeysFile .ssh/authorized_keys 6 | LogLevel DEBUG3 7 | SyslogFacility AUTHPRIV 8 | AllowTcpForwarding no 9 | PrintLastLog no 10 | -------------------------------------------------------------------------------- /keys/id_ecdsa_nistp521.pub: -------------------------------------------------------------------------------- 1 | ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAFz6UDaLYAVy8L0vMyHudXuAMjg6Bi2at/jvEJGkyHhtXESXKVB1Q2gTkmxgEHlSO7Y1sD9ayvu7SOBAaa9UTT2FgG1wpsJuRX6eg++0HRQjPIXoGCyXN4I8pXqJaBOQjBdPK7DSvF9SUo392GFGwgVM+SLRK0Pvb7WILsf4qKm6Qz5ug== vagrant@precise64 2 | -------------------------------------------------------------------------------- /sshd_configs_raw/sshd_config_no_sftp: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication yes 2 | HostbasedAuthentication no 3 | PasswordAuthentication no 4 | AllowGroups remote 5 | AuthorizedKeysFile .ssh/authorized_keys 6 | LogLevel DEBUG3 7 | SyslogFacility AUTHPRIV 8 | Subsystem sftp /bin/false 9 | PrintLastLog no 10 | -------------------------------------------------------------------------------- /client-cert/sshd_config: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication yes 2 | TrustedUserCAKeys /etc/ssh/ca.pub 3 | HostbasedAuthentication no 4 | PasswordAuthentication no 5 | AllowGroups remote 6 | LogLevel DEBUG3 7 | PrintLastLog no 8 | Subsystem sftp /usr/lib/openssh/sftp-server -l DEBUG3 9 | AcceptEnv LANG LC_* 10 | -------------------------------------------------------------------------------- /telnet/telnet: -------------------------------------------------------------------------------- 1 | service telnet 2 | { 3 | disable = no 4 | flags = REUSE 5 | socket_type = stream 6 | wait = no 7 | user = root 8 | server = /usr/sbin/in.telnetd 9 | log_on_failure += USERID 10 | } -------------------------------------------------------------------------------- /sshd_configs_raw/sshd_config_ciphers_macs: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication yes 2 | HostbasedAuthentication no 3 | PasswordAuthentication no 4 | AllowGroups remote 5 | AuthorizedKeysFile .ssh/authorized_keys 6 | LogLevel DEBUG3 7 | SyslogFacility AUTHPRIV 8 | Ciphers $CIPHER 9 | MACs $MAC 10 | PrintLastLog no 11 | -------------------------------------------------------------------------------- /pass/sshd_config_export_key: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication yes 2 | HostbasedAuthentication no 3 | PasswordAuthentication yes 4 | AllowGroups remote 5 | AuthorizedKeysFile .ssh/authorized_keys 6 | LogLevel DEBUG3 7 | SyslogFacility AUTHPRIV 8 | Subsystem sftp /usr/lib/openssh/sftp-server -l DEBUG3 9 | PrintLastLog no 10 | -------------------------------------------------------------------------------- /client-cert/user-key_ecdsa-sha2-nistp521.pub: -------------------------------------------------------------------------------- 1 | ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAClB2poqNyrlDsIHCXM6L++sSC8B771B7bPvEsQeTEPtFMzRNfQoiS9bEluegBLqL2jLextv3/YfTS/BEyomlGTywGAW4UMHdk6W6efxDtt7zGtXTICu7tM77Hbw5wW0OXp8nymyhj9P5JVnlbSj0ShCxmGRjHA4/9DjFjGKxwTj+8hvw== sherov@Ivans-MacBook-Pro.local 2 | -------------------------------------------------------------------------------- /keys/id_ecdsa_nistp384: -------------------------------------------------------------------------------- 1 | -----BEGIN EC PRIVATE KEY----- 2 | MIGkAgEBBDBzYjMUqBV8b7jbM5p0echC0VW7xu2M2d3WRMBpVuoVSxGBbgYtyGYS 3 | xxdHLC0MCRygBwYFK4EEACKhZANiAARCZs8br4tOZRLNYxI9SqNVDa/cSD3Pg7Lr 4 | N8ORRHruEytyDodZrk9dR6Y4dp2d0hdRniu5L0zS/12bhpwEa2Rj9orgt0o1ROtI 5 | wyeBQ+VDhedG9tydtAFnOMLro1avLrc= 6 | -----END EC PRIVATE KEY----- -------------------------------------------------------------------------------- /sshd_configs_raw/sshd_config_oqs: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication yes 2 | HostbasedAuthentication no 3 | PasswordAuthentication no 4 | AllowGroups remote 5 | AuthorizedKeysFile .ssh/authorized_keys 6 | LogLevel DEBUG3 7 | SyslogFacility AUTHPRIV 8 | PrintLastLog no 9 | PubkeyAcceptedAlgorithms +ssh-mldsa-44,ssh-mldsa-65,ssh-mldsa-87 10 | -------------------------------------------------------------------------------- /sshd_configs_raw/sshd_config: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication yes 2 | HostbasedAuthentication no 3 | PasswordAuthentication no 4 | AllowGroups remote 5 | AuthorizedKeysFile .ssh/authorized_keys 6 | LogLevel DEBUG3 7 | SyslogFacility AUTHPRIV 8 | Subsystem sftp /usr/lib/openssh/sftp-server -l DEBUG3 9 | PrintLastLog no 10 | AcceptEnv LANG LC_* -------------------------------------------------------------------------------- /otp/sshd_config: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication no 2 | HostbasedAuthentication no 3 | PermitEmptyPasswords no 4 | ChallengeResponseAuthentication yes 5 | PasswordAuthentication no # yes option does not work with otp and password 6 | LogLevel DEBUG3 7 | SyslogFacility AUTH 8 | UsePAM yes 9 | Subsystem sftp /usr/lib/openssh/sftp-server 10 | PrintLastLog no 11 | -------------------------------------------------------------------------------- /client-cert/sshd_config_sha1: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication yes 2 | TrustedUserCAKeys /etc/ssh/ca.pub 3 | HostbasedAuthentication no 4 | PasswordAuthentication no 5 | AllowGroups remote 6 | LogLevel DEBUG3 7 | PrintLastLog no 8 | Subsystem sftp /usr/lib/openssh/sftp-server -l DEBUG3 9 | AcceptEnv LANG LC_* 10 | PubkeyAcceptedAlgorithms ssh-rsa-cert-v01@openssh.com 11 | 12 | -------------------------------------------------------------------------------- /http-proxy/authenticated-squid.conf: -------------------------------------------------------------------------------- 1 | auth_param basic program /usr/lib/squid/basic_ncsa_auth /etc/squid/passwords 2 | auth_param basic realm proxy 3 | auth_param basic children 1 4 | auth_param basic credentialsttl 1 minute 5 | acl authenticated proxy_auth REQUIRED 6 | 7 | http_access allow authenticated 8 | 9 | http_port 3128 10 | 11 | coredump_dir /var/spool/squid 12 | -------------------------------------------------------------------------------- /keys/putty_rsa.pub: -------------------------------------------------------------------------------- 1 | ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAmCfAmE3UOublSTrNeUXxZc9piaGZDptQel4Utewkjf4hF4iHGwBW91naz7a2fd28rwmVGWhnZvnmzLUSUPpinVOs/BARIANe5TxClp0e3CbN591l96WdibeCUk/Dyxb+siExdi922LhEkXgiroDFBgCCroMV6/+hTJ5aVyxp7/2xUocsrSVp5mzFshD0vG3Wfl1+ZaXicEDcN07JaYW+ncVkQgGHUBeoCO0vLWncoCYRb+RIurKVkSp8luCfqrNr2njw7iTK7MGbbTXA5ppDvfO0t8RfSTSrhXtDGPYQDdeTO4vMOXw3kNUq9IHJBjrCnyQyh5/9VskV46LZAwCOgQ== 2 | -------------------------------------------------------------------------------- /sshd_configs_raw/sshd_config_mldsa: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication yes 2 | HostbasedAuthentication no 3 | PasswordAuthentication no 4 | AllowGroups remote 5 | AuthorizedKeysFile .ssh/authorized_keys 6 | LogLevel DEBUG3 7 | SyslogFacility AUTHPRIV 8 | PrintLastLog no 9 | HostKeyAlgorithms ssh-mldsa-44,ssh-mldsa-65,ssh-mldsa-87 10 | PubkeyAcceptedAlgorithms ssh-mldsa-44,ssh-mldsa-65,ssh-mldsa-87 11 | -------------------------------------------------------------------------------- /keys/id_ecdsa_nistp521: -------------------------------------------------------------------------------- 1 | -----BEGIN EC PRIVATE KEY----- 2 | MIHbAgEBBEFlM2yc+D8Cf69QUILwzdtg0TWGp+gkQ2PDs0ZD50kG6iPQ7Q31YL91 3 | tZYVakIULRjr33CCIrU+fltAbrPQBSEJOqAHBgUrgQQAI6GBiQOBhgAEAXPpQNot 4 | gBXLwvS8zIe51e4AyODoGLZq3+O8QkaTIeG1cRJcpUHVDaBOSbGAQeVI7tjWwP1r 5 | K+7tI4EBpr1RNPYWAbXCmwm5Ffp6D77QdFCM8hegYLJc3gjyleoloE5CMF08rsNK 6 | 8X1JSjf3YYUbCBUz5ItErQ+9vtYgux/ioqbpDPm6 7 | -----END EC PRIVATE KEY----- -------------------------------------------------------------------------------- /sshd_configs_raw/sshd_config_key: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication yes 2 | ChallengeResponseAuthentication no 3 | HostbasedAuthentication no 4 | PasswordAuthentication no 5 | AllowGroups remote 6 | AuthorizedKeysFile .ssh/authorized_keys 7 | LogLevel DEBUG3 8 | SyslogFacility AUTHPRIV 9 | Subsystem sftp /usr/lib/openssh/sftp-server -l DEBUG3 10 | PrintLastLog no 11 | AcceptEnv LANG LC_* 12 | ${MAX_AUTH_TRIES} -------------------------------------------------------------------------------- /keys/putty_rsa_encrypted.pub: -------------------------------------------------------------------------------- 1 | ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEAqn8xYAh0Q05Q6kyMnQ6YHpldGcTt8D5nP1E9nr9aXNnNAR68dKHayXsuzgy/zjq/cdGArnjNof8HNInKUL09DulWAeb4dLrP9wOXZ4vF59PGyjMDO8MkVztJyrKT1ooRcKhnVrK1zwVn06n2HB86bLYpbWTYkoCLi5PDybWh9qjMuOz02qAjJVL6gACIjrNZ4PdMCpWj8yswgr9vKPvogouF/PXunTUgAU+TKzZTBLd3ySSNPtX0lTrYpPMzzqoE0XIKhCLOs14p5xpJi9TuSdDhcFP0MdJNvLw19gF2KQACDhX3haauCpjwf8C9MA8lljLfnsFrlHYlMAD+tXLHCw== 2 | -------------------------------------------------------------------------------- /sanitize-auth-log.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | function finish { 3 | echo 'Stopped watching log' >> /tmp/sanitized-auth.log 4 | } 5 | trap finish EXIT 6 | echo 'Started watching log' >> /tmp/sanitized-auth.log 7 | 8 | tail -f /var/log/auth.log | 9 | grep --line-buffered \ 10 | -e 'authenticated 1 pkalg rsa-sha2' \ 11 | -e 'mm_.*_command' \ 12 | -e 'Setting env' >> /tmp/sanitized-auth.log 13 | -------------------------------------------------------------------------------- /keys/id_rsa1.pub: -------------------------------------------------------------------------------- 1 | ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCVmqY4fo1kOzpj/A9GMXM1K5F67jJYJXwRhHHbOm35XihJzDPe2bsvQpP1glw4d7qlsC5U8d5dOZCMO+CAewiQJadAKTSQ54fo1MnY2lwlGiKrmD/gcxjiSyuPWtDOZwslxVDIKv8UtTLgoGTZxLjo1X6eMZ4Ql0IqCH1kD3dVMEA0jxqR+5siiQ5SV/8RGsiQA01d5r47+Vy1s3I+UjbiE2A+Ff2fYa79IGfwASOxG2jS+2OkEcj8cT7MG/6kINUd9hihYoHwkDSlzHxuYYB+fmigtYe0VDC3s6Hl1+tZ1xH5dT1Y6uLnyXbSUfMTlDpetftZCrU1jngOlCDz2C0L maxbey@maxbey-workpc 2 | -------------------------------------------------------------------------------- /sshd_configs_raw/sshd_config_dsa: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication yes 2 | ChallengeResponseAuthentication no 3 | HostbasedAuthentication no 4 | PasswordAuthentication no 5 | AllowGroups remote 6 | AuthorizedKeysFile .ssh/authorized_keys 7 | LogLevel DEBUG3 8 | SyslogFacility AUTHPRIV 9 | Subsystem sftp /usr/lib/openssh/sftp-server -l DEBUG3 10 | PrintLastLog no 11 | AcceptEnv LANG LC_* 12 | PubkeyAcceptedKeyTypes +ssh-dss 13 | -------------------------------------------------------------------------------- /keys/putty3_rsa_encrypted.pub: -------------------------------------------------------------------------------- 1 | ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEJcYde3yFsqtJ20aBrmIY5AaT3DsQAOlbLwPr8vRWgrFnkIzQ8w/OUby4PgkhKsZFptZVXOiEDMWAKIWoxMjxg3xC+EwHwi7LM+jq9PHC/ZogPuDfFzgJ5cGoMeXxUCPpxkZZrNOZosDqPOwCUzSB2S/hC5FG7EqMeYzVsmdC3YvlTpCiuyt5CmZBLT828UfT6QwuR+c4XUUXG/t4ZMbi/m4dVOn9gQUxaqIrSK9HqXpP65MuzOiztatT3sL0x2Hpo8QtX6jzXL3E2gSheTQ42rbdK+0Gy1+xRNk6WUjwCFBeEPZf56IXGKK9p8TiRN08Bhs91HLalIwcIeKdYMuz rsa-key-20211006 2 | -------------------------------------------------------------------------------- /sshd_configs_raw/sshd_config_key_limit_channels: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication yes 2 | ChallengeResponseAuthentication no 3 | HostbasedAuthentication no 4 | PasswordAuthentication no 5 | AllowGroups remote 6 | AuthorizedKeysFile .ssh/authorized_keys 7 | LogLevel DEBUG3 8 | SyslogFacility AUTHPRIV 9 | Subsystem sftp /usr/lib/openssh/sftp-server -l DEBUG3 10 | PrintLastLog no 11 | AcceptEnv LANG LC_* 12 | MaxSessions $MAX_SESSIONS -------------------------------------------------------------------------------- /sshd_configs_raw/sshd_config_rsa_sha2_256: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication yes 2 | HostbasedAuthentication no 3 | PasswordAuthentication no 4 | AllowGroups remote 5 | AuthorizedKeysFile .ssh/authorized_keys 6 | LogLevel DEBUG3 7 | SyslogFacility AUTHPRIV 8 | PubkeyAcceptedKeyTypes rsa-sha2-256 9 | # openssh8.5 renamed the PubkeyAcceptedKeyTypes keyword to PubkeyAcceptedAlgorithms 10 | Subsystem sftp /usr/lib/openssh/sftp-server 11 | PrintLastLog no 12 | -------------------------------------------------------------------------------- /sshd_configs_raw/sshd_config_rsa_sha2_512: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication yes 2 | HostbasedAuthentication no 3 | PasswordAuthentication no 4 | AllowGroups remote 5 | AuthorizedKeysFile .ssh/authorized_keys 6 | LogLevel DEBUG3 7 | SyslogFacility AUTHPRIV 8 | PubkeyAcceptedKeyTypes rsa-sha2-512 9 | # openssh8.5 renamed the PubkeyAcceptedKeyTypes keyword to PubkeyAcceptedAlgorithms 10 | Subsystem sftp /usr/lib/openssh/sftp-server 11 | PrintLastLog no 12 | -------------------------------------------------------------------------------- /sshd_configs_raw/sshd_config_rsa_sha2: -------------------------------------------------------------------------------- 1 | PubkeyAuthentication yes 2 | HostbasedAuthentication no 3 | PasswordAuthentication no 4 | AllowGroups remote 5 | AuthorizedKeysFile .ssh/authorized_keys 6 | LogLevel DEBUG3 7 | SyslogFacility AUTHPRIV 8 | PubkeyAcceptedKeyTypes rsa-sha2-512,rsa-sha2-256 9 | # openssh8.5 renamed the PubkeyAcceptedKeyTypes keyword to PubkeyAcceptedAlgorithms 10 | Subsystem sftp /usr/lib/openssh/sftp-server 11 | PrintLastLog no -------------------------------------------------------------------------------- /keys/id_ed25519: -------------------------------------------------------------------------------- 1 | -----BEGIN OPENSSH PRIVATE KEY----- 2 | b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW 3 | QyNTUxOQAAACCzJN83JokBDTHc/61cXxbrhYiYlSHM2b+KLaua/oCOFwAAAKggA7TiIAO0 4 | 4gAAAAtzc2gtZWQyNTUxOQAAACCzJN83JokBDTHc/61cXxbrhYiYlSHM2b+KLaua/oCOFw 5 | AAAEAviqTJ87JMIBi+AaA7Ha/XkUwZkrsJ5ikUGPhjogtvubMk3zcmiQENMdz/rVxfFuuF 6 | iJiVIczZv4otq5r+gI4XAAAAIW5kekBDcnlzdGFsbml4cy1NYWNCb29rLUFpci5sb2NhbA 7 | ECAwQ= 8 | -----END OPENSSH PRIVATE KEY----- 9 | -------------------------------------------------------------------------------- /client-cert/user-key_ed25519: -------------------------------------------------------------------------------- 1 | -----BEGIN OPENSSH PRIVATE KEY----- 2 | b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW 3 | QyNTUxOQAAACDIABRn71ha5UnqolYiZ3ZSQfMx283zT18RB9tIR9pKmwAAAKjDMy+KwzMv 4 | igAAAAtzc2gtZWQyNTUxOQAAACDIABRn71ha5UnqolYiZ3ZSQfMx283zT18RB9tIR9pKmw 5 | AAAEDV+626M6A8/zLzeHgMKsRK2EFWoPlRxk7ZhiTlDBwkW8gAFGfvWFrlSeqiViJndlJB 6 | 8zHbzfNPXxEH20hH2kqbAAAAHnNoZXJvdkBJdmFucy1NYWNCb29rLVByby5sb2NhbAECAw 7 | QFBgc= 8 | -----END OPENSSH PRIVATE KEY----- 9 | -------------------------------------------------------------------------------- /keys/ssh_host_ed25519_key: -------------------------------------------------------------------------------- 1 | -----BEGIN OPENSSH PRIVATE KEY----- 2 | b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW 3 | QyNTUxOQAAACC9m50Dr8kvK8WWNJWpgUsfXPyhZ8E7vWlEy2Enkxmu2AAAAKiu9ecArvXn 4 | AAAAAAtzc2gtZWQyNTUxOQAAACC9m50Dr8kvK8WWNJWpgUsfXPyhZ8E7vWlEy2Enkxmu2A 5 | AAAECLan9MmLK583qSFaBTw83vgwfkFZlQZheiNfqNMfm4/b2bnQOvyS8rxZY0lamBSx9c 6 | /KFnwTu9aUTLYSeTGa7YAAAAHnNoZXJvdkBJdmFucy1NYWNCb29rLVByby5sb2NhbAECAw 7 | QFBgc= 8 | -----END OPENSSH PRIVATE KEY----- 9 | -------------------------------------------------------------------------------- /http-proxy/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM ubuntu:20.04 2 | 3 | RUN apt-get update -y && apt-get install -y locales && \ 4 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 5 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 6 | 7 | RUN apt-get update && apt-get install -y squid 8 | ARG SQUID_CONFIG=squid.conf 9 | COPY $SQUID_CONFIG /etc/squid/squid.conf 10 | COPY squid-passwords /etc/squid/passwords 11 | EXPOSE 3128 12 | CMD ["squid", "-N", "-d", "1"] 13 | -------------------------------------------------------------------------------- /socks5/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM ubuntu:22.04 2 | 3 | RUN apt-get update -y && apt-get install -y locales && \ 4 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 5 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 6 | 7 | 8 | RUN apt-get update && apt-get install -y dante-server 9 | ENV SOCKS_USER=termius SOCKS_PASSWORD=test 10 | RUN useradd --shell /usr/sbin/nologin -m $SOCKS_USER && \ 11 | echo "$SOCKS_USER:$SOCKS_PASSWORD" | chpasswd 12 | COPY danted.conf /etc/danted.conf 13 | EXPOSE 1080 14 | CMD ["danted"] 15 | -------------------------------------------------------------------------------- /socks5/danted.conf: -------------------------------------------------------------------------------- 1 | logoutput: stderr 2 | internal: 0.0.0.0 port = 1080 3 | external: eth0 4 | debug: 1 5 | 6 | socksmethod: username none 7 | 8 | user.privileged: root 9 | user.unprivileged: nobody 10 | user.libwrap: nobody 11 | 12 | # methods for socks-rules. 13 | client pass { 14 | from: 0.0.0.0/0 to: 0.0.0.0/0 15 | log: connect error 16 | socksmethod: username 17 | } 18 | 19 | socks pass { 20 | from: 0.0.0.0/0 to: 0.0.0.0/0 21 | # command: connect 22 | log: connect error 23 | socksmethod: username 24 | } 25 | -------------------------------------------------------------------------------- /yubikey-pam/entrypoint.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | create_user() { 4 | groupadd remote 5 | useradd -s /bin/bash -d /home/$1 -G remote -m $1 6 | 7 | git clone --depth=1 https://github.com/romkatv/powerlevel10k.git /home/$1/powerlevel10k 8 | echo "source ~/powerlevel10k/powerlevel10k.zsh-theme" >>/home/$1/.zshrc 9 | echo "source /tmp/zshrc" >>/home/$1/.zshrc 10 | } 11 | 12 | mkdir /var/run/sshd 13 | 14 | create_user $ADMIN 15 | 16 | touch /var/log/auth.log 17 | chmod 666 /var/log/auth.log 18 | 19 | echo 'Start daemon' 20 | /usr/sbin/sshd -D 21 | -------------------------------------------------------------------------------- /client-cert/ca.pub: -------------------------------------------------------------------------------- 1 | ssh-rsa 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 hello@termius.com 2 | -------------------------------------------------------------------------------- /rocky/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM rockylinux:9 2 | 3 | RUN dnf upgrade -y --refresh 4 | 5 | RUN dnf install -y 'dnf-command(config-manager)' 6 | 7 | RUN dnf config-manager --set-enabled crb 8 | RUN dnf install -y epel-release 9 | 10 | RUN dnf install -y openssh-server 11 | RUN dnf install -y git 12 | RUN dnf install -y pass 13 | 14 | ADD rocky/sshd_config /tmp/ 15 | ADD keys /tmp/ 16 | 17 | ADD rocky/entrypoint.sh /usr/bin/entrypoint.sh 18 | RUN chmod +x /usr/bin/entrypoint.sh 19 | 20 | ADD zshrc /tmp/ 21 | 22 | ENTRYPOINT ["/usr/bin/entrypoint.sh"] 23 | CMD /usr/sbin/sshd -D 24 | -------------------------------------------------------------------------------- /keys/id_ed25519_aes128-gcm: -------------------------------------------------------------------------------- 1 | -----BEGIN OPENSSH PRIVATE KEY----- 2 | b3BlbnNzaC1rZXktdjEAAAAAFmFlczEyOC1nY21Ab3BlbnNzaC5jb20AAAAGYmNyeXB0AA 3 | AAGAAAABBp/8Xf2U6dVSdXuA0YiiK5AAAAGAAAAAEAAAAzAAAAC3NzaC1lZDI1NTE5AAAA 4 | ICawy1sQV8gxDQg4yKIQqNhdnEN+mVvP/rntrfUBkrtMAAAAsFQhBUtHJ29IytkrTkO+b6 5 | CaOA5plW4zzgZ/APwkgmsiBW36VoRtijBQyCutcwextC2WTuWBEYsOIpGvXVnqpm0lmPzJ 6 | yA3dPeTfPdajLKZoZylt+w1tCbKYUPxz68epoVvULxYdwAVYwqU2yaQ1/j1jYqX1ck1Ijx 7 | fjqUcLFeY6BrSGweuSoGtiXUPu/pzNbUTcDwD+g/PEKYeMg1vgm44hlngtXhiD00xtHk1L 8 | 0cbX7nBx61+QUR7XRHEH2dPl0w== 9 | -----END OPENSSH PRIVATE KEY----- 10 | -------------------------------------------------------------------------------- /keys/id_ed25519_aes256-gcm: -------------------------------------------------------------------------------- 1 | -----BEGIN OPENSSH PRIVATE KEY----- 2 | b3BlbnNzaC1rZXktdjEAAAAAFmFlczI1Ni1nY21Ab3BlbnNzaC5jb20AAAAGYmNyeXB0AA 3 | AAGAAAABDR+R7YoN3q70Rs2c5+llQxAAAAGAAAAAEAAAAzAAAAC3NzaC1lZDI1NTE5AAAA 4 | IPSISt3AKepBJlbHKFpQkKRAMSzUW+wRafVZS/Qn54t7AAAAsHJT5jAnaJhvJvPkfOcpNV 5 | fSQsdN6I8AUTHrynmfuKB11jAsOvL9ka88OwW3laXi42xswOiOyrVK+6WTZ4VdiBaNNz+b 6 | ynpGD24Bxd8XRGE2vCh54Sa8Z3LMymtIh/2WGDESg3fIeAHxmAK+/RU3TQvwDeJOPz3Rne 7 | 4G4QMcxfUoDbWUipFsq1RpFNAlQtAptiy3WmmMFkWDhMnZ5vLQdefiwId/2qmKYhPMkQM9 8 | 7H+FdVqcN4Y+sNhvELWHf8HeRQ== 9 | -----END OPENSSH PRIVATE KEY----- 10 | -------------------------------------------------------------------------------- /client-cert/user-key.pub: -------------------------------------------------------------------------------- 1 | ssh-rsa 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 hello@termius.com 2 | -------------------------------------------------------------------------------- /keys/id_ecdsa_nistp256_openssh: -------------------------------------------------------------------------------- 1 | -----BEGIN OPENSSH PRIVATE KEY----- 2 | b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAaAAAABNlY2RzYS 3 | 1zaGEyLW5pc3RwMjU2AAAACG5pc3RwMjU2AAAAQQRGfccjTR+jzCzJ8JiRP2n4xzOxdrhf 4 | gRZUSU10CDplba6eu5ILsXDI94w2EJ53BTXlSyFGMfOv/5CNqppRNud1AAAAuHOSxbVzks 5 | W1AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBEZ9xyNNH6PMLMnw 6 | mJE/afjHM7F2uF+BFlRJTXQIOmVtrp67kguxcMj3jDYQnncFNeVLIUYx86//kI2qmlE253 7 | UAAAAgSeqBIxe3wiVQWdLRBpUu0kaXzXRBARFdKx8s/gcgnfMAAAAec2hlcm92QEl2YW5z 8 | LU1hY0Jvb2stUHJvLmxvY2FsAQI= 9 | -----END OPENSSH PRIVATE KEY----- 10 | -------------------------------------------------------------------------------- /keys/id_rsa_encrypted.pub: -------------------------------------------------------------------------------- 1 | ssh-rsa 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 hello@termius.com 2 | -------------------------------------------------------------------------------- /.github/pull_request_template.md: -------------------------------------------------------------------------------- 1 | ## Description of the change 2 | 3 | Description here 4 | 5 | ## Type of change 6 | 7 | - [ ] Feature 8 | - [ ] Codebase Improvements 9 | - [ ] Critical security bugs 10 | - [ ] Hotfix 11 | 12 | ## Reviewer's checklist 13 | 14 | - [ ] The code does not have any obvious logic errors. 15 | - [ ] All cases specified in the requirements are fully implemented. 16 | - [ ] There is sufficient automated testing for the new code. Existing automated tests were rewritten to account for code changes. 17 | - [ ] The new code conforms to existing style guidelines. 18 | -------------------------------------------------------------------------------- /keys/ssh_host_ecdsa_sha2_nistp256_key: -------------------------------------------------------------------------------- 1 | -----BEGIN OPENSSH PRIVATE KEY----- 2 | b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAaAAAABNlY2RzYS 3 | 1zaGEyLW5pc3RwMjU2AAAACG5pc3RwMjU2AAAAQQQzAO8fOrvhnFxN0uqleP2cZbtwO0yR 4 | 5gY62fJTd18fmqmnG/YdW9iE1uE50EZ+MxuI+lYCenJJj+kJIYoVdBOiAAAAuIWP3+KFj9 5 | /iAAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBDMA7x86u+GcXE3S 6 | 6qV4/Zxlu3A7TJHmBjrZ8lN3Xx+aqacb9h1b2ITW4TnQRn4zG4j6VgJ6ckmP6QkhihV0E6 7 | IAAAAgCiGQas4vWYbM9FUNFJ83Bo7Tuq/tslEHsu2c8jrt1q8AAAAec2hlcm92QEl2YW5z 8 | LU1hY0Jvb2stUHJvLmxvY2FsAQI= 9 | -----END OPENSSH PRIVATE KEY----- 10 | -------------------------------------------------------------------------------- /client-cert/user-key_ecdsa-sha2-nistp256: -------------------------------------------------------------------------------- 1 | -----BEGIN OPENSSH PRIVATE KEY----- 2 | b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAaAAAABNlY2RzYS 3 | 1zaGEyLW5pc3RwMjU2AAAACG5pc3RwMjU2AAAAQQQNee8dmQ5+/FalNL06PHEVPsIlqX0x 4 | Yw+3uRFGNJlx1RbhxVu6WPB7mYLkBYZ+kKlatybbRq4fcSHMqa4H1NHmAAAAuATgRcoE4E 5 | XKAAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBA157x2ZDn78VqU0 6 | vTo8cRU+wiWpfTFjD7e5EUY0mXHVFuHFW7pY8HuZguQFhn6QqVq3JttGrh9xIcyprgfU0e 7 | YAAAAgWvg/ihFsAKz9mBQzjJ9ERmkj8ZojZ/NMuhU1Inwhp6UAAAAec2hlcm92QEl2YW5z 8 | LU1hY0Jvb2stUHJvLmxvY2FsAQI= 9 | -----END OPENSSH PRIVATE KEY----- 10 | -------------------------------------------------------------------------------- /keys/id_rsa_pkcs8.pub: -------------------------------------------------------------------------------- 1 | ssh-rsa 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 sherov@Ivans-MacBook-Pro.local 2 | -------------------------------------------------------------------------------- /keys/ssh_host_rsa_key.pub: -------------------------------------------------------------------------------- 1 | ssh-rsa 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 sherov@Ivans-MacBook-Pro.local 2 | -------------------------------------------------------------------------------- /keys/id_rsa_pkcs8_encrypted.pub: -------------------------------------------------------------------------------- 1 | ssh-rsa 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 sherov@Ivans-MacBook-Pro.local 2 | -------------------------------------------------------------------------------- /keys/id_dsa_legacy.pub: -------------------------------------------------------------------------------- 1 | ssh-dss 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 root@cb348496d396 2 | -------------------------------------------------------------------------------- /client-cert/entrypoint.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | create_user() { 4 | groupadd remote 5 | useradd -s /bin/bash -d /home/$1 -G remote -m $1 6 | passwd -d $1 7 | 8 | git clone --depth=1 https://github.com/romkatv/powerlevel10k.git /home/$1/powerlevel10k 9 | echo "source ~/powerlevel10k/powerlevel10k.zsh-theme" >>/home/$1/.zshrc 10 | echo "source /tmp/zshrc" >>/home/$1/.zshrc 11 | } 12 | 13 | mkdir /var/run/sshd 14 | 15 | create_user $ADMIN 16 | 17 | touch /var/log/auth.log 18 | chmod 666 /var/log/auth.log 19 | 20 | /usr/sbin/syslog-ng -F & 21 | 22 | echo 'Start daemon' 23 | /usr/sbin/sshd -D 24 | -------------------------------------------------------------------------------- /keys/id_dsa.pub: -------------------------------------------------------------------------------- 1 | ssh-dss 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 eoskin@Eugenes-MacBook-Pro-2.local 2 | -------------------------------------------------------------------------------- /client-cert/user-key_ssh-dss.pub: -------------------------------------------------------------------------------- 1 | ssh-dss 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 sherov@Ivans-MacBook-Pro.local 2 | -------------------------------------------------------------------------------- /sftp-disabled/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM ubuntu:22.04 2 | 3 | RUN apt-get update -y && apt-get install -y locales && \ 4 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 5 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 6 | 7 | RUN apt-get update -y && apt-get upgrade -y && \ 8 | apt-get install -y openssh-server gettext-base syslog-ng \ 9 | vttest tmux byobu emacs vim mc htop curl nano \ 10 | bb cmatrix libaa-bin \ 11 | zsh git 12 | 13 | ADD entrypoint.sh /usr/bin/entrypoint.sh 14 | ADD keys /tmp/ 15 | ADD zshrc /tmp/ 16 | 17 | RUN chmod +x /usr/bin/entrypoint.sh 18 | CMD /usr/bin/entrypoint.sh 19 | -------------------------------------------------------------------------------- /telnet/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM ubuntu:22.04 2 | 3 | RUN apt-get update -y && apt-get install -y locales && \ 4 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 5 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 6 | 7 | RUN apt-get update -y && apt-get upgrade -y && \ 8 | apt-get install -y xinetd telnetd gettext-base syslog-ng \ 9 | tmux byobu emacs vim mc htop curl nano \ 10 | bb cmatrix libaa-bin \ 11 | zsh git 12 | 13 | ADD telnet/telnet /etc/xinetd.d/ 14 | ADD telnet/entrypoint.sh /usr/bin/entrypoint.sh 15 | ADD zshrc /tmp/ 16 | 17 | RUN chmod +x /usr/bin/entrypoint.sh 18 | 19 | ENTRYPOINT /usr/bin/entrypoint.sh 20 | -------------------------------------------------------------------------------- /client-cert/user-key_ecdsa-sha2-nistp384: -------------------------------------------------------------------------------- 1 | -----BEGIN OPENSSH PRIVATE KEY----- 2 | b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAiAAAABNlY2RzYS 3 | 1zaGEyLW5pc3RwMzg0AAAACG5pc3RwMzg0AAAAYQSieEtgd65XgtbP+JteaqMJB1uwlPgZ 4 | h6ivfCEgr3nWd0Uku1rJxEdIoWwJo7u81E/m4Tu0TiVCjKyW2e47Fe9eHN0s3QRe5CP9mz 5 | I6bVjKEu9Sjz5zElXzXvdDpm3yk8oAAADoJ3GwnCdxsJwAAAATZWNkc2Etc2hhMi1uaXN0 6 | cDM4NAAAAAhuaXN0cDM4NAAAAGEEonhLYHeuV4LWz/ibXmqjCQdbsJT4GYeor3whIK951n 7 | dFJLtaycRHSKFsCaO7vNRP5uE7tE4lQoysltnuOxXvXhzdLN0EXuQj/ZsyOm1YyhLvUo8+ 8 | cxJV8173Q6Zt8pPKAAAAMDb1aDt+KNnHkPgv87zTooJ6KL0wd1NAaIX2RhXGAzdCffAfp9 9 | H6fWLwb7opUz8eVAAAAB5zaGVyb3ZASXZhbnMtTWFjQm9vay1Qcm8ubG9jYWwBAg== 10 | -----END OPENSSH PRIVATE KEY----- 11 | -------------------------------------------------------------------------------- /multiple-auths/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM ubuntu:22.04 2 | 3 | RUN apt-get update -y && apt-get install -y locales && \ 4 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 5 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 6 | 7 | RUN apt-get update -y && apt-get upgrade -y && \ 8 | apt-get install -y openssh-server gettext-base syslog-ng \ 9 | vttest tmux byobu emacs vim mc htop curl nano \ 10 | bb cmatrix libaa-bin \ 11 | zsh git 12 | 13 | ADD multiple-auths/entrypoint.sh /usr/bin/entrypoint.sh 14 | ADD multiple-auths/sshd_config /etc/ssh/sshd_config 15 | ADD keys /tmp/ 16 | ADD zshrc /tmp/ 17 | 18 | RUN chmod +x /usr/bin/entrypoint.sh 19 | CMD /usr/bin/entrypoint.sh 20 | -------------------------------------------------------------------------------- /keys/id_dsa_legacy: -------------------------------------------------------------------------------- 1 | -----BEGIN DSA PRIVATE KEY----- 2 | MIIBuwIBAAKBgQCi0RUEsALyLZ9u2nLPVf3GrKy1DK1Pot4be8C4tW03WKJOS0GM 3 | wGa8Lza2PCsKvYZF8JemJow/+Qqhb7pDioCBTLy2I0PXVhmiDu0onPPKAf44jPdi 4 | XroFXWM5KWHGxdUukpp3Od8+dpT1aLJjTm5bdxyLSdWBzhZ77l6k0JXRZQIVAIsq 5 | K7wiaaZkcuLz29wdZtcM1sBxAoGAPFavg24lPHLv7ye/0VWtaEnsy8P1q+5R+rk6 6 | ty85IA9lo3hWKbNqbXUv6HipboJeNI+ylF7eRMlotZHLvBqs6pUTrIIlbJSbY+gl 7 | +67OC4yhWQtiwIFK24l9htShpFprBVD4fqTI2GpqhBhERDNj1qlJGgMxkW2K+g84 8 | XdPO27YCgYEAgHHo+QznrKv5YXHqU3kgVbg4UN6DnIaUgOgmnTMKa6eJSyzOsSBQ 9 | USnfgI9hq5L1fUZZxCaYNI0eMvNmqSkVukdDsft+CERq+bXv9o0ekeeVOZeCr+Mv 10 | bJWCnKGtrU98N1D8/xj3CSOcGJTPnNLfdPdI1kP1xUSNrSVtBFB8d9UCFDQBxlPI 11 | z4k9Xf3ZyZ3PpzkHuCMI 12 | -----END DSA PRIVATE KEY----- -------------------------------------------------------------------------------- /client-cert/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM ubuntu:22.04 2 | 3 | RUN apt-get update -y && apt-get install -y locales && \ 4 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 5 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 6 | 7 | RUN apt-get update -y && apt-get upgrade -y && \ 8 | apt-get install -y openssh-server gettext-base syslog-ng \ 9 | vttest tmux byobu emacs vim mc htop curl nano \ 10 | bb cmatrix libaa-bin \ 11 | zsh git 12 | 13 | ADD client-cert/entrypoint.sh /usr/bin/entrypoint.sh 14 | ADD client-cert/sshd_config /etc/ssh/sshd_config 15 | ADD client-cert/ca.pub /etc/ssh/ca.pub 16 | ADD zshrc /tmp/ 17 | 18 | RUN chmod +x /usr/bin/entrypoint.sh 19 | CMD /usr/bin/entrypoint.sh 20 | -------------------------------------------------------------------------------- /keyboard-interactive-pass/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM ubuntu:22.04 2 | 3 | RUN apt-get update -y && apt-get install -y locales && \ 4 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 5 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 6 | 7 | RUN apt-get update -y && apt-get upgrade -y && \ 8 | apt-get install -y openssh-server gettext-base syslog-ng \ 9 | vttest tmux byobu emacs vim mc htop curl nano \ 10 | bb cmatrix libaa-bin \ 11 | zsh git 12 | 13 | ADD keyboard-interactive-pass/entrypoint.sh /usr/bin/entrypoint.sh 14 | ADD keyboard-interactive-pass/sshd_config /etc/ssh/sshd_config 15 | ADD zshrc /tmp/ 16 | 17 | RUN chmod +x /usr/bin/entrypoint.sh 18 | CMD /usr/bin/entrypoint.sh 19 | -------------------------------------------------------------------------------- /agent-forwarding-disabled/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM ubuntu:22.04 2 | 3 | RUN apt-get update -y && apt-get install -y locales && \ 4 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 5 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 6 | 7 | RUN apt-get update -y && apt-get upgrade -y && \ 8 | apt-get install -y openssh-server gettext-base syslog-ng \ 9 | tmux byobu emacs vim mc htop curl nano \ 10 | bb cmatrix libaa-bin \ 11 | zsh git 12 | 13 | ADD agent-forwarding-disabled/entrypoint.sh /usr/bin/entrypoint.sh 14 | ADD agent-forwarding-disabled/sshd_config /etc/ssh/sshd_config 15 | ADD keys /tmp/ 16 | ADD zshrc /tmp/ 17 | 18 | RUN chmod +x /usr/bin/entrypoint.sh 19 | CMD /usr/bin/entrypoint.sh 20 | -------------------------------------------------------------------------------- /keys/id_rsa.pub: -------------------------------------------------------------------------------- 1 | ssh-rsa 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 hello@termius.com 2 | -------------------------------------------------------------------------------- /authykey/id_rsa.pub: -------------------------------------------------------------------------------- 1 | ssh-rsa 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 hello@termius.com 2 | -------------------------------------------------------------------------------- /keyboard-interactive-edgecases/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM ubuntu:22.04 2 | 3 | RUN apt-get update -y && apt-get install -y locales && \ 4 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 5 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 6 | 7 | RUN apt-get update -y && apt-get upgrade -y && \ 8 | apt-get install -y openssh-server gettext-base syslog-ng \ 9 | vttest tmux byobu emacs vim mc htop curl nano \ 10 | bb cmatrix libaa-bin \ 11 | zsh git 12 | 13 | ADD keyboard-interactive-edgecases/sshd_config /tmp 14 | ADD keys /tmp/ 15 | 16 | ADD keyboard-interactive-edgecases/entrypoint.sh /usr/bin/entrypoint.sh 17 | ADD zshrc /tmp/ 18 | 19 | RUN chmod +x /usr/bin/entrypoint.sh 20 | CMD /usr/bin/entrypoint.sh 21 | -------------------------------------------------------------------------------- /pass/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM ubuntu:22.04 2 | 3 | RUN apt-get update -y && apt-get install -y locales && \ 4 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 5 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 6 | 7 | RUN apt-get update -y && apt-get upgrade -y && \ 8 | apt-get install -y openssh-server gettext-base syslog-ng \ 9 | vttest tmux byobu emacs vim mc htop curl nano \ 10 | bb cmatrix libaa-bin \ 11 | zsh git 12 | 13 | RUN apt-get install -y pass 14 | 15 | ADD pass/entrypoint.sh /usr/bin/entrypoint.sh 16 | ADD pass/bash_logout /tmp/bash_logout 17 | ADD pass/sshd_config pass/sshd_config_export_key /tmp/ 18 | ADD keys /tmp/ 19 | ADD zshrc /tmp/ 20 | 21 | RUN chmod +x /usr/bin/entrypoint.sh 22 | CMD /usr/bin/entrypoint.sh 23 | -------------------------------------------------------------------------------- /gateway-ports/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM ubuntu:22.04 2 | 3 | RUN apt-get update -y && apt-get install -y locales && \ 4 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 5 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 6 | 7 | RUN apt-get update -y && apt-get upgrade -y && \ 8 | apt-get install -y openssh-server gettext-base syslog-ng \ 9 | vttest tmux byobu emacs vim mc htop curl nano \ 10 | bb cmatrix libaa-bin \ 11 | zsh git 12 | 13 | RUN apt-get install -y python3 14 | 15 | ADD gateway-ports/run_http.py /opt/http/run_http.py 16 | ADD gateway-ports/entrypoint.sh /usr/bin/entrypoint.sh 17 | ADD gateway-ports/sshd_config /etc/ssh/sshd_config 18 | ADD keys /tmp/ 19 | ADD zshrc /tmp/ 20 | 21 | RUN chmod +x /usr/bin/entrypoint.sh 22 | CMD /usr/bin/entrypoint.sh 23 | -------------------------------------------------------------------------------- /rocky/sshd_config: -------------------------------------------------------------------------------- 1 | LogLevel DEBUG3 2 | PrintLastLog no 3 | AcceptEnv LANG LC_* 4 | 5 | AuthenticationMethods publickey,password publickey,keyboard-interactive 6 | ChallengeResponseAuthentication no 7 | Ciphers aes128-ctr,aes192-ctr,aes256-ctr 8 | ClientAliveCountMax 0 9 | ClientAliveInterval 900 10 | GSSAPIAuthentication no 11 | HostKey /etc/ssh/ssh_host_rsa_key 12 | HostbasedAuthentication no 13 | IgnoreRhosts yes 14 | KexAlgorithms -diffie-hellman-group1-sha1,diffie-hellman-group-exchange-sha1 15 | LoginGraceTime 30 16 | MACs hmac-sha1 17 | PermitEmptyPasswords no 18 | PermitRootLogin no 19 | PermitUserEnvironment no 20 | PrintMotd no 21 | Protocol 2 22 | StrictModes yes 23 | Subsystem sftp /usr/libexec/openssh/sftp-server 24 | UseDNS no 25 | UsePAM yes 26 | UsePrivilegeSeparation yes 27 | X11Forwarding no 28 | -------------------------------------------------------------------------------- /otp/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM ubuntu:22.04 2 | 3 | RUN apt-get update -y && apt-get install -y locales && \ 4 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 5 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 6 | 7 | RUN apt-get update -y && apt-get upgrade -y && \ 8 | apt-get install -y openssh-server gettext-base syslog-ng \ 9 | vttest tmux byobu emacs vim mc htop curl nano \ 10 | bb cmatrix libaa-bin \ 11 | zsh git 12 | 13 | RUN apt-get install -y otpw-bin libpam-otpw 14 | 15 | ARG PAM_CONFIG="otp/otp.pam_sshd" 16 | ADD otp/entrypoint.sh /usr/bin/entrypoint.sh 17 | ADD otp/sshd_config /etc/ssh/sshd_config 18 | ADD ${PAM_CONFIG} /etc/pam.d/sshd 19 | ADD otp/otpw /tmp/otpw 20 | ADD zshrc /tmp/ 21 | 22 | RUN chmod +x /usr/bin/entrypoint.sh 23 | CMD /usr/bin/entrypoint.sh 24 | -------------------------------------------------------------------------------- /client-cert/user-key_ecdsa-sha2-nistp521: -------------------------------------------------------------------------------- 1 | -----BEGIN OPENSSH PRIVATE KEY----- 2 | b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAArAAAABNlY2RzYS 3 | 1zaGEyLW5pc3RwNTIxAAAACG5pc3RwNTIxAAAAhQQApQdqaKjcq5Q7CBwlzOi/vrEgvAe+ 4 | 9Qe2z7xLEHkxD7RTM0TX0KIkvWxJbnoAS6i9oy3sbb9/2H00vwRMqJpRk8sBgFuFDB3ZOl 5 | unn8Q7be8xrV0yAru7TO+x28OcFtDl6fJ8psoY/T+SVZ5W0o9EoQsZhkYxwOP/Q4xYxisc 6 | E4/vIb8AAAEge+EYg3vhGIMAAAATZWNkc2Etc2hhMi1uaXN0cDUyMQAAAAhuaXN0cDUyMQ 7 | AAAIUEAKUHamio3KuUOwgcJczov76xILwHvvUHts+8SxB5MQ+0UzNE19CiJL1sSW56AEuo 8 | vaMt7G2/f9h9NL8ETKiaUZPLAYBbhQwd2Tpbp5/EO23vMa1dMgK7u0zvsdvDnBbQ5enyfK 9 | bKGP0/klWeVtKPRKELGYZGMcDj/0OMWMYrHBOP7yG/AAAAQgEyJjpAcpQuH+2Kx+Xo8E8n 10 | WpHOEKjrGvcgruUIoyXoyfLjlSsI+is9k5t6F5QgQDh0Yf1F09lzmKaZ8dY0joBbOAAAAB 11 | 5zaGVyb3ZASXZhbnMtTWFjQm9vay1Qcm8ubG9jYWwBAgME 12 | -----END OPENSSH PRIVATE KEY----- 13 | -------------------------------------------------------------------------------- /dropbear/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM ubuntu:22.04 2 | 3 | RUN apt-get update && apt-get install locales && \ 4 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 5 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 6 | 7 | RUN apt-get update -y && apt-get upgrade -y && \ 8 | apt-get install -y openssh-server dropbear gettext-base syslog-ng \ 9 | vttest tmux byobu emacs vim mc htop curl nano \ 10 | bb cmatrix libaa-bin \ 11 | zsh git 12 | 13 | ADD entrypoint.sh /usr/bin/entrypoint.sh 14 | ADD sshd_configs_raw /tmp/ 15 | ADD keys /tmp/ 16 | ADD dropbear/dropbear_config /etc/config/dropbear 17 | ADD zshrc /tmp/ 18 | 19 | RUN chmod +x /usr/bin/entrypoint.sh 20 | ENTRYPOINT ["/usr/bin/entrypoint.sh"] 21 | CMD dropbear -w -s -G remote -F -r ${DROPBEAR_KEY_FILE:-/etc/dropbear/dropbear_rsa_host_key} 22 | -------------------------------------------------------------------------------- /otp/otp.pam_sshd: -------------------------------------------------------------------------------- 1 | account required pam_nologin.so 2 | @include common-account 3 | session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so close 4 | session required pam_loginuid.so 5 | session optional pam_keyinit.so force revoke 6 | @include common-session 7 | session optional pam_motd.so motd=/run/motd.dynamic noupdate 8 | session optional pam_motd.so # [1] 9 | session optional pam_mail.so standard noenv # [1] 10 | session required pam_limits.so 11 | session required pam_env.so # [1] 12 | session required pam_env.so user_readenv=1 envfile=/etc/default/locale 13 | session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so open 14 | 15 | auth required pam_otpw.so 16 | session optional pam_otpw.so 17 | -------------------------------------------------------------------------------- /yubikey-pam/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM ubuntu:22.04 2 | 3 | RUN apt-get update -y && apt-get install -y locales && \ 4 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 5 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 6 | 7 | RUN apt-get update -y && apt-get upgrade -y && \ 8 | apt-get install -y openssh-server gettext-base syslog-ng \ 9 | vttest tmux byobu emacs vim mc htop curl nano \ 10 | bb cmatrix libaa-bin \ 11 | zsh git 12 | 13 | RUN apt-get install -y libpam-yubico 14 | 15 | ADD yubikey-pam/entrypoint.sh /usr/bin/entrypoint.sh 16 | ADD yubikey-pam/sshd_config /etc/ssh/sshd_config 17 | ADD yubikey-pam/pam_sshd /etc/pam.d/sshd 18 | ADD yubikey-pam/yubico_passw /var/yubico_passw 19 | ADD zshrc /tmp/ 20 | 21 | RUN chmod +x /usr/bin/entrypoint.sh 22 | CMD /usr/bin/entrypoint.sh 23 | 24 | -------------------------------------------------------------------------------- /authykey/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM ubuntu:22.04 2 | 3 | RUN apt-get update -y && apt-get install -y locales && \ 4 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 5 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 6 | 7 | RUN apt-get update -y && apt-get upgrade -y && \ 8 | apt-get install -y openssh-server gettext-base syslog-ng \ 9 | vttest tmux byobu emacs vim mc htop curl nano \ 10 | bb cmatrix libaa-bin \ 11 | zsh git 12 | 13 | RUN curl -O 'https://raw.githubusercontent.com/authy/authy-ssh/master/authy-ssh' 14 | 15 | ADD authykey/entrypoint.sh /usr/bin/entrypoint.sh 16 | ADD authykey/sshd_config /etc/ssh/sshd_config 17 | ADD authykey/id_rsa.pub /tmp/id_rsa.pub 18 | ADD zshrc /tmp/ 19 | 20 | RUN chmod +x /usr/bin/entrypoint.sh 21 | ENTRYPOINT /usr/bin/entrypoint.sh 22 | CMD /usr/sbin/sshd -D 23 | -------------------------------------------------------------------------------- /mosh/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM ubuntu:22.04 2 | 3 | RUN apt-get update -y && apt-get install -y locales && \ 4 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 5 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 6 | 7 | RUN apt-get update -y && apt-get upgrade -y && \ 8 | apt-get install -y openssh-server gettext-base syslog-ng \ 9 | vttest tmux byobu emacs vim mc htop curl nano \ 10 | bb cmatrix libaa-bin \ 11 | zsh git 12 | 13 | RUN apt-get install -y mosh iproute2 14 | 15 | ADD mosh/entrypoint.sh /usr/bin/entrypoint.sh 16 | ADD mosh/sshd_config /etc/ssh/sshd_config 17 | ADD keys /tmp/ 18 | ADD zshrc /tmp/ 19 | 20 | RUN chmod +x /usr/bin/entrypoint.sh 21 | ADD sanitize-auth-log.sh /usr/bin/sanitize-auth-log.sh 22 | RUN chmod +x /usr/bin/sanitize-auth-log.sh 23 | 24 | CMD /usr/bin/entrypoint.sh 25 | -------------------------------------------------------------------------------- /client-cert/Dockerfile_sha1: -------------------------------------------------------------------------------- 1 | FROM ubuntu:22.04 2 | 3 | RUN apt-get update -y && apt-get install -y locales && \ 4 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 5 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 6 | 7 | RUN apt-get update -y && apt-get upgrade -y && \ 8 | apt-get install -y openssh-server gettext-base syslog-ng \ 9 | vttest tmux byobu emacs vim mc htop curl nano \ 10 | bb cmatrix libaa-bin \ 11 | zsh git 12 | 13 | ADD client-cert/entrypoint.sh /usr/bin/entrypoint.sh 14 | ADD client-cert/sshd_config_sha1 /etc/ssh/sshd_config 15 | ADD client-cert/ca.pub /etc/ssh/ca.pub 16 | ADD zshrc /tmp/ 17 | 18 | ADD sanitize-auth-log.sh /usr/bin/sanitize-auth-log.sh 19 | RUN chmod +x /usr/bin/sanitize-auth-log.sh 20 | 21 | RUN chmod +x /usr/bin/entrypoint.sh 22 | CMD /usr/bin/entrypoint.sh 23 | -------------------------------------------------------------------------------- /otp/README.md: -------------------------------------------------------------------------------- 1 | # One-Time PassWord Authentication (OTPW) 2 | 3 | Password prefix is `1`. 4 | 5 | ## How to enter OTPW when connecting: 6 | 7 | 1. Enter the prefix `1`. 8 | 2. Look up the requested number(s) in the [keys](/otp/keys.txt) file (numbers are shown in the password prompt, e.g., `001` or `000/001/002`). 9 | 3. Enter the values under these numbers in the requested order: 10 | * No space between the prefix and the password 11 | * Spaces inside the password (between its halves) may be kept or omitted 12 | 13 | #### Examples: 14 | | Requested numbers | Entered password | 15 | | -- | -- | 16 | | `001` | `1xN4P sv5f` _(or `1xN4Psv5f`)_ | 17 | | `000/001/002` | `1S33m 8:z9xN4P sv5fBUUZ DzYQ` _(or `1S33m8:z9xN4Psv5fBUUZDzYQ`)_ | 18 | 19 | ## References 20 | * [OTPW guide](https://www.digitalocean.com/community/tutorials/install-and-use-otpw) 21 | -------------------------------------------------------------------------------- /raspbian/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM balenalib/rpi-raspbian:bullseye-20220125 2 | 3 | # RUN apt-get update -y && apt-get install -y locales && \ 4 | # locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 5 | # ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 6 | RUN apt-get update -y && apt-get upgrade -y && \ 7 | apt-get install -y openssh-server gettext-base syslog-ng \ 8 | vttest tmux byobu emacs vim mc htop curl nano \ 9 | bb cmatrix libaa-bin \ 10 | zsh git 11 | 12 | ADD sshd_configs_raw /tmp/ 13 | ADD keys /tmp/ 14 | 15 | ADD entrypoint.sh /usr/bin/entrypoint.sh 16 | RUN chmod +x /usr/bin/entrypoint.sh 17 | 18 | ADD sanitize-auth-log.sh /usr/bin/sanitize-auth-log.sh 19 | RUN chmod +x /usr/bin/sanitize-auth-log.sh 20 | 21 | ADD zshrc /tmp/ 22 | 23 | ENTRYPOINT ["/usr/bin/entrypoint.sh"] 24 | CMD /usr/sbin/sshd -D 25 | -------------------------------------------------------------------------------- /Dockerfile: -------------------------------------------------------------------------------- 1 | ARG UBUNTU_VERSION=22.04 2 | FROM ubuntu:${UBUNTU_VERSION} 3 | 4 | RUN apt-get update -y && apt-get install -y locales && \ 5 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 6 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 7 | 8 | RUN apt-get update -y && apt-get upgrade -y && \ 9 | apt-get install -y openssh-server gettext-base syslog-ng \ 10 | vttest tmux byobu emacs vim mc htop curl nano \ 11 | bb cmatrix libaa-bin \ 12 | zsh git 13 | 14 | ADD sshd_configs_raw /tmp/ 15 | ADD keys /tmp/ 16 | 17 | ADD entrypoint.sh /usr/bin/entrypoint.sh 18 | RUN chmod +x /usr/bin/entrypoint.sh 19 | 20 | ADD sanitize-auth-log.sh /usr/bin/sanitize-auth-log.sh 21 | RUN chmod +x /usr/bin/sanitize-auth-log.sh 22 | 23 | ADD zshrc /tmp/ 24 | 25 | ENTRYPOINT ["/usr/bin/entrypoint.sh"] 26 | CMD /usr/sbin/sshd -D 27 | -------------------------------------------------------------------------------- /otp/entrypoint.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | create_user() { 4 | groupadd remote 5 | useradd -s /bin/bash -d /home/$1 -G remote -m $1 6 | 7 | git clone --depth=1 https://github.com/romkatv/powerlevel10k.git /home/$1/powerlevel10k 8 | echo "source ~/powerlevel10k/powerlevel10k.zsh-theme" >>/home/$1/.zshrc 9 | echo "source /tmp/zshrc" >>/home/$1/.zshrc 10 | } 11 | 12 | add_credential() { 13 | mv /tmp/otpw /home/$1/.otpw 14 | chown $1: /home/$1/.otpw 15 | chmod 600 /home/$1/.otpw 16 | 17 | if [[ (-n "$1") || (-n "$2") ]]; then 18 | echo "$1:$2" | chpasswd 19 | fi 20 | } 21 | 22 | mkdir /var/run/sshd 23 | 24 | create_user $ADMIN 25 | add_credential $ADMIN $ADMIN_PASS 26 | 27 | touch /var/log/auth.log 28 | chmod 666 /var/log/auth.log 29 | /usr/sbin/syslog-ng -F & 30 | 31 | echo 'Start daemon' 32 | /usr/sbin/sshd -D 33 | -------------------------------------------------------------------------------- /authypass/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM ubuntu:22.04 2 | 3 | RUN apt-get update -y && apt-get install -y locales && \ 4 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 5 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 6 | 7 | RUN apt-get update -y && apt-get upgrade -y && \ 8 | apt-get install -y openssh-server gettext-base syslog-ng \ 9 | vttest tmux byobu emacs vim mc htop curl nano \ 10 | bb cmatrix libaa-bin \ 11 | zsh git 12 | 13 | RUN curl -O 'https://raw.githubusercontent.com/authy/authy-ssh/master/authy-ssh' 14 | 15 | ADD authypass/entrypoint.sh /usr/bin/entrypoint.sh 16 | ADD authypass/sshd_config /etc/ssh/sshd_config 17 | ADD authypass/set_password.sh /usr/bin/set_password.sh 18 | ADD zshrc /tmp/ 19 | 20 | RUN chmod +x /usr/bin/entrypoint.sh /usr/bin/set_password.sh 21 | ENTRYPOINT /usr/bin/entrypoint.sh 22 | CMD /usr/sbin/sshd -D 23 | -------------------------------------------------------------------------------- /authypass/entrypoint.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | create_user() { 4 | useradd -s /bin/bash -d /home/$1 -G remote -m $1 5 | 6 | git clone --depth=1 https://github.com/romkatv/powerlevel10k.git /home/$1/powerlevel10k 7 | echo "source ~/powerlevel10k/powerlevel10k.zsh-theme" >>/home/$1/.zshrc 8 | echo "source /tmp/zshrc" >>/home/$1/.zshrc 9 | } 10 | 11 | add_credential() { 12 | passwd -d $1 13 | 14 | echo y |authy-ssh enable $1 $2 $3 $4 15 | } 16 | 17 | mkdir /var/run/sshd 18 | groupadd remote 19 | echo -e "$AUTHY_API_KEY\n2\n" | bash authy-ssh install /usr/local/bin 20 | 21 | for admin in $ADMIN_LIST 22 | do 23 | ADMIN_ITEM=($(echo $admin | tr ":" " ")) 24 | create_user ${ADMIN_ITEM[0]} 25 | add_credential ${ADMIN_ITEM[*]} 26 | done 27 | 28 | touch /var/log/auth.log 29 | chmod 666 /var/log/auth.log 30 | 31 | echo 'Start daemon' 32 | /usr/sbin/sshd -D 33 | -------------------------------------------------------------------------------- /hostkey-order/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM ubuntu:22.04 2 | 3 | RUN apt-get update -y && apt-get install -y locales && \ 4 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 5 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 6 | 7 | RUN apt-get update -y && apt-get upgrade -y && \ 8 | apt-get install -y openssh-server gettext-base syslog-ng \ 9 | vttest tmux byobu emacs vim mc htop curl nano \ 10 | bb cmatrix libaa-bin \ 11 | zsh git 12 | 13 | RUN apt-get install -y pass 14 | 15 | ADD sshd_configs_raw /tmp/ 16 | ADD keys /tmp/ 17 | 18 | ADD hostkey-order/entrypoint.sh /usr/bin/entrypoint.sh 19 | RUN chmod +x /usr/bin/entrypoint.sh 20 | 21 | ADD sanitize-auth-log.sh /usr/bin/sanitize-auth-log.sh 22 | RUN chmod +x /usr/bin/sanitize-auth-log.sh 23 | 24 | ADD zshrc /tmp/ 25 | 26 | ENTRYPOINT ["/usr/bin/entrypoint.sh"] 27 | CMD /usr/sbin/sshd -D 28 | 29 | -------------------------------------------------------------------------------- /tinyssh/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM ubuntu:22.04 2 | 3 | RUN apt-get update && apt-get install locales && \ 4 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 5 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 6 | 7 | RUN apt-get update -y && apt-get upgrade -y && \ 8 | apt-get install -y tinysshd ucspi-tcp syslog-ng \ 9 | tmux byobu emacs vim mc htop curl nano \ 10 | bb cmatrix libaa-bin \ 11 | zsh git 12 | 13 | ADD entrypoint.sh /usr/bin/entrypoint.sh 14 | ADD sshd_configs_raw /tmp/ 15 | ADD keys /tmp/ 16 | RUN chmod +x /usr/bin/entrypoint.sh 17 | ADD sanitize-auth-log.sh /usr/bin/sanitize-auth-log.sh 18 | RUN chmod +x /usr/bin/sanitize-auth-log.sh 19 | RUN tinysshd-makekey /etc/tinyssh/sshkeydir 20 | ADD zshrc /tmp/ 21 | 22 | ENTRYPOINT ["/usr/bin/entrypoint.sh"] 23 | CMD tcpserver -HRDl0 0.0.0.0 22 /usr/sbin/tinysshd -v -s /etc/tinyssh/sshkeydir 24 | -------------------------------------------------------------------------------- /otp/pass_otp.pam_sshd: -------------------------------------------------------------------------------- 1 | account required pam_nologin.so 2 | @include common-account 3 | session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so close 4 | session required pam_loginuid.so 5 | session optional pam_keyinit.so force revoke 6 | @include common-session 7 | session optional pam_motd.so motd=/run/motd.dynamic noupdate 8 | session optional pam_motd.so # [1] 9 | session optional pam_mail.so standard noenv # [1] 10 | session required pam_limits.so 11 | session required pam_env.so # [1] 12 | session required pam_env.so user_readenv=1 envfile=/etc/default/locale 13 | session [success=ok ignore=ignore module_unknown=ignore default=bad] pam_selinux.so open 14 | 15 | @include common-password 16 | @include common-auth 17 | auth required pam_otpw.so 18 | session optional pam_otpw.so 19 | -------------------------------------------------------------------------------- /ubuntu-old/Dockerfile: -------------------------------------------------------------------------------- 1 | ARG UBUNTU_VERSION=12.04 2 | FROM ubuntu:${UBUNTU_VERSION} 3 | 4 | RUN sed -i -e 's/archive.ubuntu.com/old-releases.ubuntu.com/g' /etc/apt/sources.list 5 | 6 | RUN apt-get update -y && \ 7 | apt-get install -y locales && \ 8 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 9 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 10 | 11 | RUN apt-get update -y && apt-get upgrade -y 12 | 13 | RUN apt-get install -y openssh-server 14 | 15 | RUN apt-get install -y gettext-base \ 16 | vttest tmux byobu emacs vim mc htop curl nano \ 17 | bb cmatrix libaa-bin \ 18 | zsh git 19 | 20 | ADD sshd_configs_raw /tmp/ 21 | ADD keys /tmp/ 22 | 23 | ADD ubuntu-old/entrypoint.sh /usr/bin/entrypoint.sh 24 | RUN chmod +x /usr/bin/entrypoint.sh 25 | 26 | ADD zshrc /tmp/ 27 | 28 | ENTRYPOINT ["/usr/bin/entrypoint.sh"] 29 | CMD /usr/sbin/sshd -eD 30 | -------------------------------------------------------------------------------- /anomaly-exec/Dockerfile: -------------------------------------------------------------------------------- 1 | FROM ubuntu:22.04 2 | 3 | RUN apt-get update -y && apt-get install -y locales && \ 4 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 5 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 6 | 7 | RUN apt-get update -y && apt-get upgrade -y && \ 8 | apt-get install -y openssh-server gettext-base syslog-ng \ 9 | vttest tmux byobu emacs vim mc htop curl nano \ 10 | bb cmatrix libaa-bin \ 11 | zsh git 12 | 13 | ADD sshd_configs_raw /tmp/ 14 | ADD keys /tmp/ 15 | 16 | ADD entrypoint.sh /usr/bin/entrypoint.sh 17 | RUN chmod +x /usr/bin/entrypoint.sh 18 | 19 | ADD sanitize-auth-log.sh /usr/bin/sanitize-auth-log.sh 20 | RUN chmod +x /usr/bin/sanitize-auth-log.sh 21 | ADD anomaly-exec/bashrc /tmp/ 22 | 23 | ADD zshrc /tmp/ 24 | ARG SSH_SERVER_NAME=OpenSSH 25 | RUN sed -i'' "s/OpenSSH_8.2p1/${SSH_SERVER_NAME}_8.2p1/g" /usr/sbin/sshd 26 | 27 | ENTRYPOINT ["/usr/bin/entrypoint.sh"] 28 | CMD /usr/sbin/sshd -D 29 | -------------------------------------------------------------------------------- /CONTRIBUTING.md: -------------------------------------------------------------------------------- 1 | # Contributing 2 | 3 | We love pull requests from everyone. 4 | 5 | Fork, then clone the repo: 6 | 7 | ```bash 8 | git clone git@github.com:your-username/hosts-farm.git 9 | ``` 10 | 11 | Start services: 12 | 13 | ```bash 14 | docker-compose up 15 | ``` 16 | 17 | Make sure you can connect to service you want: 18 | 19 | ssh [username]@$DOCKER_HOST [-p $SERVICE_PORT] 20 | telnet @$DOCKER_HOST $SERVICE_PORT 21 | 22 | 23 | Push to your fork and [submit a pull request][pr]. 24 | 25 | [pr]: https://github.com/Crystalnix/hosts-farm/compare/ 26 | 27 | At this point you're waiting on us. We like to at least comment on pull requests 28 | within three business days (and, typically, one business day). We may suggest 29 | some changes or improvements or alternatives. 30 | 31 | Some things that will increase the chance that your pull request is accepted: 32 | 33 | * Write a [good commit message][commit]. 34 | 35 | [commit]: http://tbaggery.com/2008/04/19/a-note-about-git-commit-messages.html 36 | -------------------------------------------------------------------------------- /gateway-ports/run_http.py: -------------------------------------------------------------------------------- 1 | from http.server import BaseHTTPRequestHandler, HTTPServer 2 | 3 | 4 | class Handler(BaseHTTPRequestHandler): 5 | def _set_headers(self): 6 | self.send_response(200) 7 | self.send_header('Content-type', 'text/html') 8 | self.end_headers() 9 | 10 | def do_GET(self): 11 | self._set_headers() 12 | self.wfile.write("

hi!

") 13 | 14 | def do_HEAD(self): 15 | self._set_headers() 16 | 17 | def do_POST(self): 18 | self._set_headers() 19 | self.wfile.write("

POST!

") 20 | 21 | def run(server_class=HTTPServer, handler_class=Handler, port=80): 22 | server_address = ('', port) 23 | httpd = server_class(server_address, handler_class) 24 | print('Starting httpd...') 25 | httpd.serve_forever() 26 | 27 | if __name__ == "__main__": 28 | from sys import argv 29 | 30 | if len(argv) == 2: 31 | run(port=int(argv[1])) 32 | else: 33 | run() 34 | -------------------------------------------------------------------------------- /keyboard-interactive-edgecases/entrypoint.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | # Copyright (c) 2020 Termius Corporation. 3 | 4 | create_user() { 5 | groupadd remote 6 | useradd -s /bin/bash -d /home/$1 -G remote -m $1 7 | 8 | git clone --depth=1 https://github.com/romkatv/powerlevel10k.git /home/$1/powerlevel10k 9 | echo "source ~/powerlevel10k/powerlevel10k.zsh-theme" >>/home/$1/.zshrc 10 | echo "source /tmp/zshrc" >>/home/$1/.zshrc 11 | } 12 | 13 | add_credential() { 14 | mkdir -p /home/$1/.ssh/ 15 | echo "$ADMIN:$ADMIN_PASS" | chpasswd 16 | 17 | (cd /tmp && cat $PUB_KEY_NAME > /home/$1/.ssh/authorized_keys) 18 | chmod 700 /home/$1/.ssh 19 | chmod 600 /home/$1/.ssh/authorized_keys 20 | chown -R $1:remote /home/$1/.ssh/ 21 | } 22 | 23 | envsubst < /tmp/sshd_config > "/etc/ssh/sshd_config" 24 | mkdir /var/run/sshd 25 | 26 | create_user $ADMIN 27 | add_credential $ADMIN $ADMIN_PASS 28 | 29 | touch /var/log/auth.log 30 | chmod 666 /var/log/auth.log 31 | syslog-ng -F & 32 | 33 | echo 'Start daemon' 34 | /usr/sbin/sshd -D 35 | -------------------------------------------------------------------------------- /keyboard-interactive-pass/entrypoint.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | # Copyright (c) 2020 Termius Corporation. 3 | 4 | create_user() { 5 | groupadd remote 6 | useradd -s /bin/bash -d /home/$1 -G remote -m $1 7 | 8 | git clone --depth=1 https://github.com/romkatv/powerlevel10k.git /home/$1/powerlevel10k 9 | echo "source ~/powerlevel10k/powerlevel10k.zsh-theme" >>/home/$1/.zshrc 10 | echo "source /tmp/zshrc" >>/home/$1/.zshrc 11 | } 12 | 13 | add_credential() { 14 | mkdir -p /home/$1/.ssh/ 15 | echo "$ADMIN:$ADMIN_PASS" | chpasswd 16 | 17 | if [ -n "${PRIVATE_KEY_NAME}" ]; then 18 | PUB_KEY="$PRIVATE_KEY_NAME.pub" 19 | 20 | cp /tmp/$PRIVATE_KEY_NAME /home/$1/.ssh/id_rsa 21 | cp /tmp/$PUB_KEY /home/$1/.ssh/id_rsa.pub 22 | 23 | chmod 400 /home/$1/.ssh/id_rsa 24 | chown -R $1:remote /home/$1/.ssh/ 25 | fi 26 | } 27 | 28 | mkdir /var/run/sshd 29 | 30 | create_user $ADMIN 31 | add_credential $ADMIN $ADMIN_PASS 32 | 33 | touch /var/log/auth.log 34 | chmod 666 /var/log/auth.log 35 | syslog-ng -F & 36 | 37 | echo 'Start daemon' 38 | /usr/sbin/sshd -D 39 | -------------------------------------------------------------------------------- /authykey/entrypoint.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | create_user() { 4 | useradd -s /bin/bash -d /home/$1 -G remote -m $1 5 | 6 | git clone --depth=1 https://github.com/romkatv/powerlevel10k.git /home/$1/powerlevel10k 7 | echo "source ~/powerlevel10k/powerlevel10k.zsh-theme" >>/home/$1/.zshrc 8 | echo "source /tmp/zshrc" >>/home/$1/.zshrc 9 | } 10 | 11 | add_credential() { 12 | passwd -d $1 13 | mkdir -p /home/$1/.ssh/ 14 | cat /tmp/id_rsa.pub > /home/$1/.ssh/authorized_keys 15 | chmod 700 /home/$1/.ssh 16 | chmod 600 /home/$1/.ssh/authorized_keys 17 | chown -R $1:remote /home/$1/.ssh/ 18 | echo y | authy-ssh enable $1 $2 $3 $4 19 | } 20 | 21 | mkdir /var/run/sshd 22 | groupadd remote 23 | echo -e "$AUTHY_API_KEY\n2\n" | bash authy-ssh install /usr/local/bin 24 | 25 | for admin in $ADMIN_LIST 26 | do 27 | ADMIN_ITEM=($(echo $admin | tr ":" " ")) 28 | create_user ${ADMIN_ITEM[0]} 29 | add_credential ${ADMIN_ITEM[*]} 30 | done 31 | 32 | create_user $ADMIN 33 | add_credential $ADMIN 34 | 35 | touch /var/log/auth.log 36 | chmod 666 /var/log/auth.log 37 | 38 | echo 'Start daemon' 39 | /usr/sbin/sshd -D 40 | -------------------------------------------------------------------------------- /agent-forwarding-disabled/entrypoint.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | create_user() { 4 | groupadd remote 5 | useradd -s /bin/bash -d /home/$1 -G remote -m $1 6 | 7 | git clone --depth=1 https://github.com/romkatv/powerlevel10k.git /home/$1/powerlevel10k 8 | echo "source ~/powerlevel10k/powerlevel10k.zsh-theme" >>/home/$1/.zshrc 9 | echo "source /tmp/zshrc" >>/home/$1/.zshrc 10 | } 11 | 12 | add_credential() { 13 | passwd -d $1 14 | mkdir -p /home/$1/.ssh/ 15 | cat /tmp/$PUB_KEY_NAME > /home/$1/.ssh/authorized_keys 16 | chmod 700 /home/$1/.ssh 17 | chmod 600 /home/$1/.ssh/authorized_keys 18 | chown -R $1:remote /home/$1/.ssh/ 19 | 20 | if [ -n "${PRIVATE_KEY_NAME}" ]; then 21 | PUB_KEY="$PRIVATE_KEY_NAME.pub" 22 | 23 | cp /tmp/$PRIVATE_KEY_NAME /home/$1/.ssh/id_rsa 24 | cp /tmp/$PUB_KEY /home/$1/.ssh/id_rsa.pub 25 | 26 | chmod 400 /home/$1/.ssh/id_rsa 27 | chown -R $1:remote /home/$1/.ssh/ 28 | fi 29 | } 30 | 31 | mkdir /var/run/sshd 32 | 33 | create_user $ADMIN 34 | add_credential $ADMIN 35 | 36 | touch /var/log/auth.log 37 | chmod 666 /var/log/auth.log 38 | 39 | echo 'Start daemon' 40 | /usr/sbin/sshd -D 41 | -------------------------------------------------------------------------------- /oqs/Dockerfile: -------------------------------------------------------------------------------- 1 | ARG UBUNTU_VERSION=22.04 2 | FROM ubuntu:${UBUNTU_VERSION} 3 | 4 | RUN apt-get update -y && apt-get install -y locales && \ 5 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 6 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 7 | 8 | RUN apt-get update -y && apt-get upgrade -y && \ 9 | apt-get install -y gettext-base syslog-ng \ 10 | vttest tmux byobu emacs vim mc htop curl nano \ 11 | bb cmatrix libaa-bin \ 12 | zsh git build-essential autoconf automake cmake zlib1g-dev libssl-dev ninja-build 13 | 14 | RUN git clone https://github.com/open-quantum-safe/openssh.git --depth 1 --branch OQS-v10 \ 15 | && cd openssh \ 16 | && ./oqs-scripts/clone_liboqs.sh \ 17 | && ./oqs-scripts/build_liboqs.sh \ 18 | && ./oqs-scripts/build_openssh.sh 19 | 20 | ADD sshd_configs_raw /tmp/ 21 | ADD keys /tmp/ 22 | 23 | ADD oqs/entrypoint.sh /usr/bin/entrypoint.sh 24 | RUN chmod +x /usr/bin/entrypoint.sh 25 | 26 | ADD sanitize-auth-log.sh /usr/bin/sanitize-auth-log.sh 27 | RUN chmod +x /usr/bin/sanitize-auth-log.sh 28 | 29 | ADD zshrc /tmp/ 30 | 31 | ENTRYPOINT ["/usr/bin/entrypoint.sh"] 32 | CMD /openssh/sshd -f /etc/ssh/sshd_config -D 33 | -------------------------------------------------------------------------------- /openssh10/Dockerfile: -------------------------------------------------------------------------------- 1 | ARG UBUNTU_VERSION=22.04 2 | FROM ubuntu:${UBUNTU_VERSION} 3 | 4 | RUN apt-get update -y && apt-get install -y locales && \ 5 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 6 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 7 | 8 | RUN apt-get update -y && apt-get upgrade -y && \ 9 | apt-get install -y gettext-base syslog-ng \ 10 | vttest tmux byobu emacs vim mc htop curl nano \ 11 | bb cmatrix libaa-bin \ 12 | zsh git build-essential autoconf zlib1g-dev libssl-dev 13 | 14 | RUN git clone https://github.com/openssh/openssh-portable.git --depth 1 --branch V_10_0_P2 \ 15 | && cd openssh-portable \ 16 | && autoreconf \ 17 | && ./configure --prefix=/usr --sysconfdir=/etc/ssh --with-privsep-path=/var/lib/sshd \ 18 | && make -j$(nproc) \ 19 | && make install 20 | 21 | ADD sshd_configs_raw /tmp/ 22 | ADD keys /tmp/ 23 | 24 | ADD openssh10/entrypoint.sh /usr/bin/entrypoint.sh 25 | RUN chmod +x /usr/bin/entrypoint.sh 26 | 27 | ADD sanitize-auth-log.sh /usr/bin/sanitize-auth-log.sh 28 | RUN chmod +x /usr/bin/sanitize-auth-log.sh 29 | 30 | ADD zshrc /tmp/ 31 | 32 | ENTRYPOINT ["/usr/bin/entrypoint.sh"] 33 | CMD /usr/sbin/sshd -D 34 | -------------------------------------------------------------------------------- /multiple-auths/entrypoint.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | create_user() { 4 | groupadd remote 5 | useradd -s /bin/bash -d /home/$1 -G remote -m $1 6 | 7 | git clone --depth=1 https://github.com/romkatv/powerlevel10k.git /home/$1/powerlevel10k 8 | echo "source ~/powerlevel10k/powerlevel10k.zsh-theme" >>/home/$1/.zshrc 9 | echo "source /tmp/zshrc" >>/home/$1/.zshrc 10 | } 11 | 12 | add_credential() { 13 | mkdir -p /home/$1/.ssh/ 14 | echo "$ADMIN:$ADMIN_PASS" | chpasswd 15 | 16 | cat /tmp/$PUB_KEY_NAME > /home/$1/.ssh/authorized_keys 17 | chmod 700 /home/$1/.ssh 18 | chmod 600 /home/$1/.ssh/authorized_keys 19 | chown -R $1:remote /home/$1/.ssh/ 20 | 21 | if [ -n "${PRIVATE_KEY_NAME}" ]; then 22 | PUB_KEY="$PRIVATE_KEY_NAME.pub" 23 | 24 | cp /tmp/$PRIVATE_KEY_NAME /home/$1/.ssh/id_rsa 25 | cp /tmp/$PUB_KEY /home/$1/.ssh/id_rsa.pub 26 | 27 | chmod 400 /home/$1/.ssh/id_rsa 28 | chown -R $1:remote /home/$1/.ssh/ 29 | fi 30 | } 31 | 32 | mkdir /var/run/sshd 33 | 34 | create_user $ADMIN 35 | add_credential $ADMIN $ADMIN_PASS 36 | 37 | touch /var/log/auth.log 38 | chmod 666 /var/log/auth.log 39 | 40 | echo 'Start daemon' 41 | /usr/sbin/sshd -D 42 | -------------------------------------------------------------------------------- /keyboard-interactive-custom/Dockerfile: -------------------------------------------------------------------------------- 1 | # Copyright (c) 2022 Termius Corporation. 2 | FROM ubuntu:22.04 as builder 3 | 4 | RUN mkdir /app && apt-get update -y && apt-get upgrade -y && apt-get install -y gcc libpam0g-dev 5 | ADD keyboard-interactive-custom/termius-pam.c /app/termius-pam.c 6 | WORKDIR /app/ 7 | RUN gcc -fPIC -c termius-pam.c && gcc -shared -o termius-pam.so termius-pam.o -lpam 8 | 9 | FROM ubuntu:22.04 10 | 11 | RUN apt-get update -y && apt-get install -y locales && \ 12 | locale-gen en_US.UTF-8 && update-locale LC_ALL="en_US.UTF-8" 13 | ENV LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 DEBIAN_FRONTEND=noninteractive 14 | 15 | RUN apt-get update -y && apt-get upgrade -y && \ 16 | apt-get install -y openssh-server gettext-base syslog-ng \ 17 | vttest tmux byobu emacs vim mc htop curl nano \ 18 | bb cmatrix libaa-bin \ 19 | libpam-python 20 | 21 | ADD keyboard-interactive-pass/entrypoint.sh /usr/bin/entrypoint.sh 22 | ADD keyboard-interactive-pass/sshd_config /etc/ssh/sshd_config 23 | ADD keyboard-interactive-custom/pam_sshd /etc/pam.d/sshd 24 | COPY --from=builder /app/termius-pam.so /lib/security/termius-pam.so 25 | ADD zshrc /tmp/ 26 | 27 | RUN chmod +x /usr/bin/entrypoint.sh 28 | CMD /usr/bin/entrypoint.sh 29 | -------------------------------------------------------------------------------- /gateway-ports/entrypoint.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | create_user() { 4 | groupadd remote 5 | useradd -s /bin/bash -d /home/$1 -G remote -m $1 6 | 7 | git clone --depth=1 https://github.com/romkatv/powerlevel10k.git /home/$1/powerlevel10k 8 | echo "source ~/powerlevel10k/powerlevel10k.zsh-theme" >>/home/$1/.zshrc 9 | echo "source /tmp/zshrc" >>/home/$1/.zshrc 10 | } 11 | 12 | add_credential() { 13 | passwd -d $1 14 | mkdir -p /home/$1/.ssh/ 15 | cat /tmp/$PUB_KEY_NAME > /home/$1/.ssh/authorized_keys 16 | chmod 700 /home/$1/.ssh 17 | chmod 600 /home/$1/.ssh/authorized_keys 18 | chown -R $1:remote /home/$1/.ssh/ 19 | 20 | if [ -n "${PRIVATE_KEY_NAME}" ]; then 21 | PUB_KEY="$PRIVATE_KEY_NAME.pub" 22 | 23 | cp /tmp/$PRIVATE_KEY_NAME /home/$1/.ssh/id_rsa 24 | cp /tmp/$PUB_KEY /home/$1/.ssh/id_rsa.pub 25 | 26 | chmod 400 /home/$1/.ssh/id_rsa 27 | chown -R $1:remote /home/$1/.ssh/ 28 | fi 29 | } 30 | 31 | mkdir /var/run/sshd 32 | 33 | create_user $ADMIN 34 | add_credential $ADMIN 35 | 36 | touch /var/log/auth.log 37 | chmod 666 /var/log/auth.log 38 | 39 | echo 'Start dummy HTTP server' 40 | python3 /opt/http/run_http.py & 41 | 42 | echo 'Start daemon' 43 | /usr/sbin/sshd -D 44 | -------------------------------------------------------------------------------- /pass/entrypoint.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | create_user() { 4 | groupadd remote 5 | useradd -s /bin/bash -s /bin/bash -d /home/$1 -G remote -m $1 6 | 7 | git clone --depth=1 https://github.com/romkatv/powerlevel10k.git /home/$1/powerlevel10k 8 | echo "source ~/powerlevel10k/powerlevel10k.zsh-theme" >>/home/$1/.zshrc 9 | echo "source /tmp/zshrc" >>/home/$1/.zshrc 10 | } 11 | 12 | add_credential() { 13 | mkdir -p /home/$1/.ssh/ 14 | echo "$1:$2" | chpasswd 15 | cp /tmp/bash_logout /home/$1/.bash_logout 16 | chown -R $1:remote /home/$1/.bash_logout 17 | 18 | if [ -n "${PRIVATE_KEY_NAME}" ]; then 19 | PUB_KEY="$PRIVATE_KEY_NAME.pub" 20 | 21 | cp /tmp/$PRIVATE_KEY_NAME /home/$1/.ssh/id_rsa 22 | cp /tmp/$PUB_KEY /home/$1/.ssh/id_rsa.pub 23 | 24 | chmod 400 /home/$1/.ssh/id_rsa 25 | chown -R $1:remote /home/$1/.ssh/ 26 | fi 27 | } 28 | 29 | envsubst < /tmp/$CONFIG > "/etc/ssh/sshd_config" 30 | 31 | mkdir /var/run/sshd 32 | 33 | create_user $ADMIN 34 | add_credential $ADMIN $ADMIN_PASS 35 | 36 | touch /var/log/auth.log 37 | chmod 666 /var/log/auth.log 38 | 39 | rm /etc/ssh/ssh_host_*_key 40 | ssh-keygen -t ed25519 -f /etc/ssh/ssh_host_ed25519_key 41 | 42 | echo 'Start daemon' 43 | exec /usr/sbin/sshd -D 44 | -------------------------------------------------------------------------------- /rocky/entrypoint.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | # Copyright (c) 2024 Termius Corporation. 3 | 4 | create_user() { 5 | groupadd remote 6 | useradd -s /bin/bash -d /home/$1 -G remote -m $1 7 | 8 | git clone --depth=1 https://github.com/romkatv/powerlevel10k.git /home/$1/powerlevel10k 9 | echo "source ~/powerlevel10k/powerlevel10k.zsh-theme" >>/home/$1/.zshrc 10 | echo "source /tmp/zshrc" >>/home/$1/.zshrc 11 | } 12 | 13 | add_credential() { 14 | passwd -d $1 15 | mkdir -p /home/$1/.ssh/ 16 | echo "$1:$2" | chpasswd 17 | (cd /tmp && cat $PUB_KEY_NAME > /home/$1/.ssh/authorized_keys) 18 | chmod 700 /home/$1/.ssh 19 | chmod 600 /home/$1/.ssh/authorized_keys 20 | chown -R $1:remote /home/$1/.ssh/ 21 | 22 | if [ -n "${PRIVATE_KEY_NAME}" ]; then 23 | PUB_KEY="$PRIVATE_KEY_NAME.pub" 24 | 25 | cp /tmp/$PRIVATE_KEY_NAME /home/$1/.ssh/id_rsa 26 | cp /tmp/$PUB_KEY /home/$1/.ssh/id_rsa.pub 27 | 28 | chmod 400 /home/$1/.ssh/id_rsa 29 | chown -R $1:remote /home/$1/.ssh/ 30 | fi 31 | } 32 | 33 | cat /tmp/sshd_config > "/etc/ssh/sshd_config" 34 | 35 | create_user $ADMIN 36 | add_credential $ADMIN $ADMIN_PASS 37 | 38 | rm /etc/ssh/ssh_host_*_key 39 | ssh-keygen -t rsa -f /etc/ssh/ssh_host_rsa_key 40 | 41 | echo 'Start daemon' 42 | echo "$@" 43 | exec "$@" 44 | -------------------------------------------------------------------------------- /ubuntu-old/entrypoint.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | # Copyright (c) 2024 Termius Corporation. 3 | 4 | create_user() { 5 | groupadd remote 6 | useradd -s /bin/bash -d /home/$1 -G remote -m $1 7 | 8 | git clone --depth=1 https://github.com/romkatv/powerlevel10k.git /home/$1/powerlevel10k 9 | echo "source ~/powerlevel10k/powerlevel10k.zsh-theme" >>/home/$1/.zshrc 10 | echo "source /tmp/zshrc" >>/home/$1/.zshrc 11 | (cat /tmp/bashrc > /home/$1/.bashrc) 12 | } 13 | 14 | add_credential() { 15 | passwd -d $1 16 | mkdir -p /home/$1/.ssh/ 17 | (cd /tmp && cat $PUB_KEY_NAME > /home/$1/.ssh/authorized_keys) 18 | chmod 700 /home/$1/.ssh 19 | chmod 600 /home/$1/.ssh/authorized_keys 20 | chown -R $1:remote /home/$1/.ssh/ 21 | 22 | if [ -n "${PRIVATE_KEY_NAME}" ]; then 23 | PUB_KEY="$PRIVATE_KEY_NAME.pub" 24 | 25 | cp /tmp/$PRIVATE_KEY_NAME /home/$1/.ssh/id_rsa 26 | cp /tmp/$PUB_KEY /home/$1/.ssh/id_rsa.pub 27 | 28 | chmod 400 /home/$1/.ssh/id_rsa 29 | chown -R $1:remote /home/$1/.ssh/ 30 | fi 31 | } 32 | 33 | envsubst < /tmp/$CONFIG > "/etc/ssh/sshd_config" 34 | 35 | mkdir /var/run/sshd 36 | 37 | create_user $ADMIN 38 | add_credential $ADMIN 39 | 40 | rm /etc/ssh/ssh_host_*_key* 41 | ssh-keygen -t rsa -f /etc/ssh/ssh_host_rsa_key 42 | 43 | echo 'Start daemon' 44 | echo "$@" 45 | exec "$@" 46 | -------------------------------------------------------------------------------- /keys/id_dsa: -------------------------------------------------------------------------------- 1 | -----BEGIN OPENSSH PRIVATE KEY----- 2 | b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAABsgAAAAdzc2gtZH 3 | NzAAAAgQC8WE0phxVhsBCa0libEo1UX5I1mwPjEDD+40liAj1xYcqpc4/vurHoLYYQKM+t 4 | q7S7XDWiuOGi2hrZlcSXwz9kZrOaXSEFOA8gksTOmmkciJTO1sykFRHRX83OKxydRZJt3h 5 | mASBI7yTe39U15S29MWUNZX0cAucyOWLbKKtO3hQAAABUApr+xei3kJkSrieXYXu+Vs4F8 6 | YNEAAACACGlHhEKJR5kkEiE761LpyFlqzBwiDfWnpVU218/6glGxlXtEms80+vc8M3cDNN 7 | 9fBZ93UcMbQObH+Bsi2aqE1VDjPtrVliNe5um0SsOnLk/YQqwsJcl5oj9iPOu86II/TOgu 8 | eWBcuH4kYH6RLp6nJWYoqyaK1qV7d/IS2aWaQQwAAACBALNafaElbhAfA3No4FgSn+2U1H 9 | 1o6cDiW2Aoh0l4pB+TelPUkmNZ32OjIRO18Hf4e13upWYr/xYgAEYl6HQqW+qXWsns4wWv 10 | jNNu50Y/ibBWc1IkfIZFN2/3Sf6VTj8YcehAwxq0bTJAMLbfD64tL/k4Siw4VJae96qqY8 11 | g5AZ2tAAAB+DTS/gI00v4CAAAAB3NzaC1kc3MAAACBALxYTSmHFWGwEJrSWJsSjVRfkjWb 12 | A+MQMP7jSWICPXFhyqlzj++6segthhAoz62rtLtcNaK44aLaGtmVxJfDP2Rms5pdIQU4Dy 13 | CSxM6aaRyIlM7WzKQVEdFfzc4rHJ1Fkm3eGYBIEjvJN7f1TXlLb0xZQ1lfRwC5zI5Ytsoq 14 | 07eFAAAAFQCmv7F6LeQmRKuJ5dhe75WzgXxg0QAAAIAIaUeEQolHmSQSITvrUunIWWrMHC 15 | IN9aelVTbXz/qCUbGVe0SazzT69zwzdwM0318Fn3dRwxtA5sf4GyLZqoTVUOM+2tWWI17m 16 | 6bRKw6cuT9hCrCwlyXmiP2I867zogj9M6C55YFy4fiRgfpEunqclZiirJorWpXt38hLZpZ 17 | pBDAAAAIEAs1p9oSVuEB8Dc2jgWBKf7ZTUfWjpwOJbYCiHSXikH5N6U9SSY1nfY6MhE7Xw 18 | d/h7Xe6lZiv/FiAARiXodCpb6pdayezjBa+M027nRj+JsFZzUiR8hkU3b/dJ/pVOPxhx6E 19 | DDGrRtMkAwtt8Pri0v+ThKLDhUlp73qqpjyDkBna0AAAAUYtY0srruybUPEEf7Dc1JlMmJ 20 | zRoAAAAiZW9za2luQEV1Z2VuZXMtTWFjQm9vay1Qcm8tMi5sb2NhbA== 21 | -----END OPENSSH PRIVATE KEY----- 22 | -------------------------------------------------------------------------------- /client-cert/user-key_ssh-dss: -------------------------------------------------------------------------------- 1 | -----BEGIN OPENSSH PRIVATE KEY----- 2 | b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAABsQAAAAdzc2gtZH 3 | NzAAAAgQCyrEjSDSkP00K2DCISDBmEa8o3LX/XoJvLkHuJMLeK3PCwt8RxJR72QsRCbvMh 4 | I+0OE9c7dZIoKwUrGhJzTKBZeo2+zr3msWRmO0ipu8Hoh98itlwvE+l878osHGQHVFT0L6 5 | yYbSj5L2XF/pO1CU3o52z7AHwZknqJPCkIYue2HQAAABUA1OFJNlzxWn2FlVlMWor4pC8h 6 | 980AAACAaE4eEUpod7y9RPq+y5ACZQdVnRdVDoiCyM/0a0mPk01Jjmn9DiDDEnrykLvnCx 7 | phz/ND6NQj8BHOJl4kmR9dVBAafqfcLtevYJJhytAZmBF8ljr6rts/F82BjhE9pZgAEpiX 8 | qXawME67MVJ/WqqZ9ITt+FE2Xd/NmWXnnDKdHfEAAACAB6mld+jaCXfVlPEoVVo2fmcCCk 9 | 5X9FZszeC4uF2UAcKx9FALmrq3Ixx8EK7c8EkxuES4ecT7Z2E+6eFV+hhQyeMh/90n5TSI 10 | wtsZWOQo13+okbbGxBWaYkgheKzIMrd+k1vxL1SPkOtz4yoTy5GrkupeYkAPVQ8AQEjRtp 11 | DcegAAAAH46SYb4OkmG+AAAAAHc3NoLWRzcwAAAIEAsqxI0g0pD9NCtgwiEgwZhGvKNy1/ 12 | 16Cby5B7iTC3itzwsLfEcSUe9kLEQm7zISPtDhPXO3WSKCsFKxoSc0ygWXqNvs695rFkZj 13 | tIqbvB6IffIrZcLxPpfO/KLBxkB1RU9C+smG0o+S9lxf6TtQlN6Ods+wB8GZJ6iTwpCGLn 14 | th0AAAAVANThSTZc8Vp9hZVZTFqK+KQvIffNAAAAgGhOHhFKaHe8vUT6vsuQAmUHVZ0XVQ 15 | 6IgsjP9GtJj5NNSY5p/Q4gwxJ68pC75wsaYc/zQ+jUI/ARziZeJJkfXVQQGn6n3C7Xr2CS 16 | YcrQGZgRfJY6+q7bPxfNgY4RPaWYABKYl6l2sDBOuzFSf1qqmfSE7fhRNl3fzZll55wynR 17 | 3xAAAAgAeppXfo2gl31ZTxKFVaNn5nAgpOV/RWbM3guLhdlAHCsfRQC5q6tyMcfBCu3PBJ 18 | MbhEuHnE+2dhPunhVfoYUMnjIf/dJ+U0iMLbGVjkKNd/qJG2xsQVmmJIIXisyDK3fpNb8S 19 | 9Uj5Drc+MqE8uRq5LqXmJAD1UPAEBI0baQ3HoAAAAAFFyE67W7AYOW6s2MpfOyo+PRMbE0 20 | AAAAHnNoZXJvdkBJdmFucy1NYWNCb29rLVByby5sb2NhbAECAwQF 21 | -----END OPENSSH PRIVATE KEY----- 22 | -------------------------------------------------------------------------------- /entrypoint.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | # Copyright (c) 2020 Termius Corporation. 3 | 4 | create_user() { 5 | groupadd remote 6 | useradd -s /bin/bash -d /home/$1 -G remote -m $1 7 | 8 | git clone --depth=1 https://github.com/romkatv/powerlevel10k.git /home/$1/powerlevel10k 9 | echo "source ~/powerlevel10k/powerlevel10k.zsh-theme" >>/home/$1/.zshrc 10 | echo "source /tmp/zshrc" >>/home/$1/.zshrc 11 | (cat /tmp/bashrc > /home/$1/.bashrc) 12 | } 13 | 14 | add_credential() { 15 | passwd -d $1 16 | mkdir -p /home/$1/.ssh/ 17 | (cd /tmp && cat $PUB_KEY_NAME > /home/$1/.ssh/authorized_keys) 18 | chmod 700 /home/$1/.ssh 19 | chmod 600 /home/$1/.ssh/authorized_keys 20 | chown -R $1:remote /home/$1/.ssh/ 21 | 22 | if [ -n "${PRIVATE_KEY_NAME}" ]; then 23 | PUB_KEY="$PRIVATE_KEY_NAME.pub" 24 | 25 | cp /tmp/$PRIVATE_KEY_NAME /home/$1/.ssh/id_rsa 26 | cp /tmp/$PUB_KEY /home/$1/.ssh/id_rsa.pub 27 | 28 | chmod 400 /home/$1/.ssh/id_rsa 29 | chown -R $1:remote /home/$1/.ssh/ 30 | fi 31 | } 32 | 33 | envsubst < /tmp/$CONFIG > "/etc/ssh/sshd_config" 34 | 35 | mkdir /var/run/sshd 36 | 37 | create_user $ADMIN 38 | add_credential $ADMIN 39 | 40 | touch /var/log/auth.log 41 | chmod 666 /var/log/auth.log 42 | 43 | /usr/sbin/syslog-ng -F & 44 | /bin/sanitize-auth-log.sh & 45 | 46 | rm /etc/ssh/ssh_host_*_key 47 | ssh-keygen -t ed25519 -f /etc/ssh/ssh_host_ed25519_key 48 | 49 | echo 'Start daemon' 50 | echo "$@" 51 | exec "$@" 52 | -------------------------------------------------------------------------------- /keys/putty_rsa: -------------------------------------------------------------------------------- 1 | PuTTY-User-Key-File-2: ssh-rsa 2 | Encryption: none 3 | Comment: rsa-key-20210624 4 | Public-Lines: 6 5 | AAAAB3NzaC1yc2EAAAABJQAAAQEAmCfAmE3UOublSTrNeUXxZc9piaGZDptQel4U 6 | tewkjf4hF4iHGwBW91naz7a2fd28rwmVGWhnZvnmzLUSUPpinVOs/BARIANe5TxC 7 | lp0e3CbN591l96WdibeCUk/Dyxb+siExdi922LhEkXgiroDFBgCCroMV6/+hTJ5a 8 | Vyxp7/2xUocsrSVp5mzFshD0vG3Wfl1+ZaXicEDcN07JaYW+ncVkQgGHUBeoCO0v 9 | LWncoCYRb+RIurKVkSp8luCfqrNr2njw7iTK7MGbbTXA5ppDvfO0t8RfSTSrhXtD 10 | GPYQDdeTO4vMOXw3kNUq9IHJBjrCnyQyh5/9VskV46LZAwCOgQ== 11 | Private-Lines: 14 12 | AAABAQCL0YCL9H3VQuCIezlarvmAJmD7AzKzefbs/IG77cC51MR2fXU7aBiQRLs7 13 | aaDGsBUrOTzm6lEuMb9UU1zwd2GJptZPaLXKY/ZWG7LPl0zKTSvp0l2zIpDDvWL/ 14 | h5FS1tw0++hDFtvpvhV+wWv6TNC5aEC8CcEeDX921rPhZxU9ZDOdujgwuelP6YFq 15 | vtvT5YbyFMIJqyXVzSL62iXcpoMz2wstg+Vx8FTGFVzDkLirl2Jhdp8emIOlfrUE 16 | HXzpH/71yZ+8X5q994TYtzk4Vkt2OzNdyoDiacb1Xo6SYd7ShUnkm5651VaBlWX7 17 | f+QZDrVwbgFSEYpDIwRpI3gwjYaNAAAAgQD9ycc0RACsng3fjJDUKgQkLV63r0rb 18 | /BozyZYwNAlcaD+H5jkC0LSwVZj7raGqvd3y6tmuvRm59o2PEySGuaN/9bOs3SY5 19 | GPM7Ev1kHBWgTs3hRt11XHrz/lZOjdD2/l8QE9MmglpuqCoSk/bRcSCD0TEanDpM 20 | //RstCIoIiBaLQAAAIEAmXs5FZ2HmbyznRM39RzCvZTZILrkinTlieRDrD3WPNdx 21 | 17lPklY3yJ+IP33I0lS59zkYknprW2aD+1mcAfNeCySXBy1pWl9uMaqeJg01ycjW 22 | V8cSEl+/E7hcLDckAO4jsr4APL+5n3nEv/wHUi6KPR7kyzA0e8J52RdwrhVzXiUA 23 | AACAGQtCU3qXwMuZ8GyEYW3T4raV/eT3tVTHj44zMWGgnRCNE0IlViibPU+Jqk8u 24 | TyTkyQcRXg1KBdCONrENBmj5mtldm2gX3EFLi0nn5HoNamUJQP5ST6wzLveQvxev 25 | 8cNvHClxQ8yX344Je7mDwLkrEQMZImPdSrAUuwu6L5bzlwU= 26 | Private-MAC: a2f5fd32038054e22608770e961e1432dbe127ef 27 | -------------------------------------------------------------------------------- /mosh/entrypoint.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | create_user() { 4 | groupadd remote 5 | useradd -s /bin/bash -d /home/$1 -G remote -m $1 6 | 7 | git clone --depth=1 https://github.com/romkatv/powerlevel10k.git /home/$1/powerlevel10k 8 | echo "source ~/powerlevel10k/powerlevel10k.zsh-theme" >>/home/$1/.zshrc 9 | echo "source /tmp/zshrc" >>/home/$1/.zshrc 10 | } 11 | 12 | add_key() { 13 | mkdir -p /home/$1/.ssh/ 14 | cat /tmp/$PUB_KEY_NAME > /home/$1/.ssh/authorized_keys 15 | chmod 700 /home/$1/.ssh 16 | chmod 600 /home/$1/.ssh/authorized_keys 17 | chown -R $1:remote /home/$1/.ssh/ 18 | 19 | if [ -n "${PRIVATE_KEY_NAME}" ]; then 20 | PUB_KEY="$PRIVATE_KEY_NAME.pub" 21 | 22 | cp /tmp/$PRIVATE_KEY_NAME /home/$1/.ssh/id_rsa 23 | cp /tmp/$PUB_KEY /home/$1/.ssh/id_rsa.pub 24 | 25 | chmod 400 /home/$1/.ssh/id_rsa 26 | chown -R $1:remote /home/$1/.ssh/ 27 | fi 28 | } 29 | 30 | add_pass() { 31 | mkdir -p /home/$1/.ssh/ 32 | if [ -z "$ADMIN_PASS" ]; then 33 | passwd -d $1 34 | else 35 | echo "$ADMIN:$ADMIN_PASS" | chpasswd 36 | fi 37 | } 38 | 39 | mkdir /var/run/sshd 40 | 41 | create_user $ADMIN 42 | add_key $ADMIN 43 | add_pass $ADMIN 44 | 45 | touch /var/log/auth.log 46 | chmod 666 /var/log/auth.log 47 | 48 | /usr/sbin/syslog-ng -F & 49 | /bin/sanitize-auth-log.sh & 50 | 51 | if [ -n "$UNSTABLE_NETWORK" ]; then 52 | tc qdisc add dev eth0 root netem delay 500ms 500ms drop 10% 53 | fi 54 | 55 | echo 'Start sshd' 56 | /usr/sbin/sshd -D 57 | -------------------------------------------------------------------------------- /keys/putty_rsa_encrypted: -------------------------------------------------------------------------------- 1 | PuTTY-User-Key-File-2: ssh-rsa 2 | Encryption: aes256-cbc 3 | Comment: rsa-key-20210628 4 | Public-Lines: 6 5 | AAAAB3NzaC1yc2EAAAABJQAAAQEAqn8xYAh0Q05Q6kyMnQ6YHpldGcTt8D5nP1E9 6 | nr9aXNnNAR68dKHayXsuzgy/zjq/cdGArnjNof8HNInKUL09DulWAeb4dLrP9wOX 7 | Z4vF59PGyjMDO8MkVztJyrKT1ooRcKhnVrK1zwVn06n2HB86bLYpbWTYkoCLi5PD 8 | ybWh9qjMuOz02qAjJVL6gACIjrNZ4PdMCpWj8yswgr9vKPvogouF/PXunTUgAU+T 9 | KzZTBLd3ySSNPtX0lTrYpPMzzqoE0XIKhCLOs14p5xpJi9TuSdDhcFP0MdJNvLw1 10 | 9gF2KQACDhX3haauCpjwf8C9MA8lljLfnsFrlHYlMAD+tXLHCw== 11 | Private-Lines: 14 12 | f95N+XoPdcUhUq294nu4GmOt52IEbYIxNL9aCyIT5Ii46wbtQAFuX6FMOxKDnNYZ 13 | 8RTJmYA2XbEwq0CbJ1izLNzUtyYt+cZZSvZljXVA5L1WpMM5N6+LzqEhjWmx6UVI 14 | eel7Y+fdR8NvQyfUv3qparRZioQhdnsjEfdtNy0bk36aaRx/Ct7yMZTP5fBaFCg8 15 | xT/3VnHY65ekQq9Q5iEaFpAHXa16/dgbNK/fRZx87YSc5BCBAsqCTQqHvLvkKriA 16 | sLW+AvubZK95GPRw2d99o9DKtjF2GEDqzFCPXsxcXGhCQSRVu0QDOiWeUo3MwM0I 17 | Dju0K/QDcD8yOEZN/CnZB4I13Vt5TUN0pMBNIh3bgRGr9O4hoQosi8XkvRnaPu4f 18 | qUixEBPuWmNtbnktJyNLORE0cCbU6gD73rZe8G4G2uB9HF2bJh5T9JGqziYN/EmN 19 | PrPzrdnX6he8K8IRtf2TFmmqqOTuRXd6J3nVXapF72wODktUMJxC8XBucS3Yd9ML 20 | /VG7ADtvOHhGoQ88IxM0+9UZaAx5TWHbrzCCeVERimu4VHQlMgEHUoBtazekLYuw 21 | EaRszQGXaBGxB2ifuz7uVFkc57SmlgZGxr3ishs5xWpTxvHDcJ7SQmaBI8MZtPaG 22 | 203v5Og9jruQnbOH9l+8V+x40qhS/d4ruKL7+ceOIc/AOtiTxlb2XDF/XpsREmwD 23 | vqz/8hyAYZMV4DMjiNWe1GJe/G5d7QU3KUtJ7DqERjpefe5Xy6lfXLehgIvfznQh 24 | GxbCskniyegp1KePAByds5v2wu3jL/cc27ykL4FZb7ETgDWvcDEeC42SHSV8xi6n 25 | UkoDmGO9ymplWN8oll9xSwLWYZgb7fmx2iszco/nC16oYfjUyVFsz8afEtMnhlX2 26 | Private-MAC: 6120100c103701e0be82d2814e27b0d7558b2913 27 | -------------------------------------------------------------------------------- /oqs/entrypoint.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | # Copyright (c) 2025 Termius Corporation. 3 | 4 | create_user() { 5 | groupadd remote 6 | useradd -s /bin/bash -d /home/$1 -G remote -m $1 7 | 8 | git clone --depth=1 https://github.com/romkatv/powerlevel10k.git /home/$1/powerlevel10k 9 | echo "source ~/powerlevel10k/powerlevel10k.zsh-theme" >>/home/$1/.zshrc 10 | echo "source /tmp/zshrc" >>/home/$1/.zshrc 11 | (cat /tmp/bashrc > /home/$1/.bashrc) 12 | } 13 | 14 | add_credential() { 15 | passwd -d $1 16 | mkdir -p /home/$1/.ssh/ 17 | (cd /tmp && cat $PUB_KEY_NAME > /home/$1/.ssh/authorized_keys) 18 | chmod 700 /home/$1/.ssh 19 | chmod 600 /home/$1/.ssh/authorized_keys 20 | chown -R $1:remote /home/$1/.ssh/ 21 | 22 | if [ -n "${PRIVATE_KEY_NAME}" ]; then 23 | PUB_KEY="$PRIVATE_KEY_NAME.pub" 24 | 25 | cp /tmp/$PRIVATE_KEY_NAME /home/$1/.ssh/id_rsa 26 | cp /tmp/$PUB_KEY /home/$1/.ssh/id_rsa.pub 27 | 28 | chmod 400 /home/$1/.ssh/id_rsa 29 | chown -R $1:remote /home/$1/.ssh/ 30 | fi 31 | } 32 | 33 | envsubst < /tmp/$CONFIG > "/etc/ssh/sshd_config" 34 | 35 | mkdir -p /var/run/sshd 36 | useradd -r -d /var/empty/sshd -s /sbin/nologin sshd || true 37 | 38 | create_user $ADMIN 39 | add_credential $ADMIN 40 | 41 | touch /var/log/auth.log 42 | chmod 666 /var/log/auth.log 43 | 44 | /usr/sbin/syslog-ng -F & 45 | /bin/sanitize-auth-log.sh & 46 | 47 | rm /etc/ssh/ssh_host_*_key 48 | ssh-keygen -t ed25519 -f /etc/ssh/ssh_host_ed25519_key 49 | 50 | echo 'Start daemon' 51 | echo "$@" 52 | exec "$@" 53 | -------------------------------------------------------------------------------- /client-cert/user-key_ed25519-cert.pub: -------------------------------------------------------------------------------- 1 | ssh-ed25519-cert-v01@openssh.com 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 sherov@Ivans-MacBook-Pro.local 2 | -------------------------------------------------------------------------------- /openssh10/entrypoint.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | # Copyright (c) 2025 Termius Corporation. 3 | 4 | create_user() { 5 | groupadd remote 6 | useradd -s /bin/bash -d /home/$1 -G remote -m $1 7 | 8 | git clone --depth=1 https://github.com/romkatv/powerlevel10k.git /home/$1/powerlevel10k 9 | echo "source ~/powerlevel10k/powerlevel10k.zsh-theme" >>/home/$1/.zshrc 10 | echo "source /tmp/zshrc" >>/home/$1/.zshrc 11 | (cat /tmp/bashrc > /home/$1/.bashrc) 12 | } 13 | 14 | add_credential() { 15 | passwd -d $1 16 | mkdir -p /home/$1/.ssh/ 17 | (cd /tmp && cat $PUB_KEY_NAME > /home/$1/.ssh/authorized_keys) 18 | chmod 700 /home/$1/.ssh 19 | chmod 600 /home/$1/.ssh/authorized_keys 20 | chown -R $1:remote /home/$1/.ssh/ 21 | 22 | if [ -n "${PRIVATE_KEY_NAME}" ]; then 23 | PUB_KEY="$PRIVATE_KEY_NAME.pub" 24 | 25 | cp /tmp/$PRIVATE_KEY_NAME /home/$1/.ssh/id_rsa 26 | cp /tmp/$PUB_KEY /home/$1/.ssh/id_rsa.pub 27 | 28 | chmod 400 /home/$1/.ssh/id_rsa 29 | chown -R $1:remote /home/$1/.ssh/ 30 | fi 31 | } 32 | 33 | envsubst < /tmp/$CONFIG > "/etc/ssh/sshd_config" 34 | 35 | mkdir -p /var/run/sshd 36 | useradd -r -d /var/empty/sshd -s /sbin/nologin sshd || true 37 | 38 | create_user $ADMIN 39 | add_credential $ADMIN 40 | 41 | touch /var/log/auth.log 42 | chmod 666 /var/log/auth.log 43 | 44 | /usr/sbin/syslog-ng -F & 45 | /bin/sanitize-auth-log.sh & 46 | 47 | rm /etc/ssh/ssh_host_*_key 48 | ssh-keygen -t ed25519 -f /etc/ssh/ssh_host_ed25519_key 49 | 50 | echo 'Start daemon' 51 | echo "$@" 52 | exec "$@" 53 | -------------------------------------------------------------------------------- /hostkey-order/entrypoint.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | # Copyright (c) 2020 Termius Corporation. 3 | 4 | create_user() { 5 | groupadd remote 6 | useradd -s /bin/bash -d /home/$1 -G remote -m $1 7 | 8 | git clone --depth=1 https://github.com/romkatv/powerlevel10k.git /home/$1/powerlevel10k 9 | echo "source ~/powerlevel10k/powerlevel10k.zsh-theme" >>/home/$1/.zshrc 10 | echo "source /tmp/zshrc" >>/home/$1/.zshrc 11 | (cat /tmp/bashrc > /home/$1/.bashrc) 12 | } 13 | 14 | add_credential() { 15 | mkdir -p /home/$1/.ssh/ 16 | echo "$ADMIN:$ADMIN_PASS" | chpasswd 17 | cp /tmp/bash_logout /home/$1/.bash_logout 18 | chown -R $1:remote /home/$1/.bash_logout 19 | 20 | if [ -n "${PRIVATE_KEY_NAME}" ]; then 21 | PUB_KEY="$PRIVATE_KEY_NAME.pub" 22 | 23 | cp /tmp/$PRIVATE_KEY_NAME /home/$1/.ssh/id_rsa 24 | cp /tmp/$PUB_KEY /home/$1/.ssh/id_rsa.pub 25 | 26 | chmod 400 /home/$1/.ssh/id_rsa 27 | chown -R $1:remote /home/$1/.ssh/ 28 | fi 29 | } 30 | 31 | envsubst < /tmp/$CONFIG > "/etc/ssh/sshd_config" 32 | 33 | mkdir /var/run/sshd 34 | 35 | create_user $ADMIN 36 | add_credential $ADMIN $ADMIN_PASS 37 | 38 | touch /var/log/auth.log 39 | chmod 666 /var/log/auth.log 40 | 41 | /usr/sbin/syslog-ng -F & 42 | /bin/sanitize-auth-log.sh & 43 | 44 | rm /etc/ssh/ssh_host_* 45 | 46 | if [ -n "${HOST_KEY_NAME}" ]; then 47 | # shellcheck disable=SC2066 48 | for KEY in ${HOST_KEY_NAME} 49 | do 50 | cp "/tmp/${KEY}" /etc/ssh/ 51 | chmod 600 "/etc/ssh/${KEY}" 52 | done 53 | fi 54 | 55 | echo 'Start daemon' 56 | echo "$@" 57 | exec "$@" 58 | -------------------------------------------------------------------------------- /client-cert/user-key_ecdsa-sha2-nistp256-cert.pub: -------------------------------------------------------------------------------- 1 | ecdsa-sha2-nistp256-cert-v01@openssh.com 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 sherov@Ivans-MacBook-Pro.local 2 | -------------------------------------------------------------------------------- /client-cert/user-key_ecdsa-sha2-nistp384-cert.pub: -------------------------------------------------------------------------------- 1 | ecdsa-sha2-nistp384-cert-v01@openssh.com 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 sherov@Ivans-MacBook-Pro.local 2 | -------------------------------------------------------------------------------- /keys/putty3_rsa_encrypted: -------------------------------------------------------------------------------- 1 | PuTTY-User-Key-File-3: ssh-rsa 2 | Encryption: aes256-cbc 3 | Comment: rsa-key-20211006 4 | Public-Lines: 6 5 | AAAAB3NzaC1yc2EAAAADAQABAAABAQDEJcYde3yFsqtJ20aBrmIY5AaT3DsQAOlb 6 | LwPr8vRWgrFnkIzQ8w/OUby4PgkhKsZFptZVXOiEDMWAKIWoxMjxg3xC+EwHwi7L 7 | M+jq9PHC/ZogPuDfFzgJ5cGoMeXxUCPpxkZZrNOZosDqPOwCUzSB2S/hC5FG7EqM 8 | eYzVsmdC3YvlTpCiuyt5CmZBLT828UfT6QwuR+c4XUUXG/t4ZMbi/m4dVOn9gQUx 9 | aqIrSK9HqXpP65MuzOiztatT3sL0x2Hpo8QtX6jzXL3E2gSheTQ42rbdK+0Gy1+x 10 | RNk6WUjwCFBeEPZf56IXGKK9p8TiRN08Bhs91HLalIwcIeKdYMuz 11 | Key-Derivation: Argon2id 12 | Argon2-Memory: 8192 13 | Argon2-Passes: 8 14 | Argon2-Parallelism: 1 15 | Argon2-Salt: 355ec83ece61a41db25d1531b1466739 16 | Private-Lines: 14 17 | gUxz8KTxKI3NhuNRT8xrFZKWieYHnhObhjq+7wi09YOJVHi0UyTAe7ZB3r175TTb 18 | 0qIGktssH7zwunTmYd8+xREfy2rbK/5alEEykTzB3ii58dobraRVy9tbOrhSE9Aq 19 | qw4pM9pqpUpRc+XHRDennaL40ytoUuqGg6RIk28+nWWZ3a/t5+BrS8eoZhSplNkI 20 | s5cASGQlMrN0LhYVsDMOPHZ0JvVR/AMW+vVMS9tehrOIlCxPR2JuNqCMVlCO23Yz 21 | uS7w9ov6AO0+vVaLRQW8ULGYm5jb9B/9gkr4wsNGvb8KKBPEmSr9zqMa+/Yyy3gr 22 | wf8y1YnqmwQtl6oFDNWPA8OK6j9Z3oLeRTmLee1FPN1K+RkRsaKc7Cb45WmdoMjR 23 | RhrrnmRytxaOLjffSJwgRcxRsD1jkU/a7EVDqfdG5RBDhXLGdAN/D3ItTtBtytnF 24 | 9dCSmmBgcH6X7qjjlFujpTR6PkXyrmbsshHRVELgntH25cKlhxvSZnUWS/YDBG/q 25 | LOj8ELNLoQW7ymz1WJ+5qOGTAK5fZV5hXJePYjQX093xdUhTZDBRE3JK7MtcTwXh 26 | DNNHl6BXunDGerISuxQ34zG0Cqadl9hV3QwGUp03/cZMH4XuAi/J3s6McTT3AsTp 27 | keNdjbloTwZSz1j1KYHlxvBZU0aOxsXeDV/VeDTb4BB1E3F3BtlOQZ9fNDp8Qy3o 28 | lnUJJRbfnqcF8/NrD/DzyUf8uPEHHiPzVWco2/Ju9VNvioOzk7qcwBVldFGZb8VV 29 | rbB2wzRv9S4XRg/KaWXQK4uRh4XkVm/WwSc32YhbRMWYUy/4a6q4GbQ7Fro8unjZ 30 | 0vQMRw1oK+jVIl3PfnuJxCckiZCt6z17vBWbHiTFjPEjROOCshOqwYscrliV+fNR 31 | Private-MAC: f9a4c5eb25d2d7704c39bae22990072c3bbca3ee774268a2354ae1feb2e6becb 32 | -------------------------------------------------------------------------------- /client-cert/user-key_ecdsa-sha2-nistp521-cert.pub: -------------------------------------------------------------------------------- 1 | ecdsa-sha2-nistp521-cert-v01@openssh.com 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 sherov@Ivans-MacBook-Pro.local 2 | -------------------------------------------------------------------------------- /keys/id_rsa1: -------------------------------------------------------------------------------- 1 | -----BEGIN RSA PRIVATE KEY----- 2 | MIIEpQIBAAKCAQEAlZqmOH6NZDs6Y/wPRjFzNSuReu4yWCV8EYRx2zpt+V4oScwz 3 | 3tm7L0KT9YJcOHe6pbAuVPHeXTmQjDvggHsIkCWnQCk0kOeH6NTJ2NpcJRoiq5g/ 4 | 4HMY4ksrj1rQzmcLJcVQyCr/FLUy4KBk2cS46NV+njGeEJdCKgh9ZA93VTBANI8a 5 | kfubIokOUlf/ERrIkANNXea+O/lctbNyPlI24hNgPhX9n2Gu/SBn8AEjsRto0vtj 6 | pBHI/HE+zBv+pCDVHfYYoWKB8JA0pcx8bmGAfn5ooLWHtFQwt7Oh5dfrWdcR+XU9 7 | WOri58l20lHzE5Q6XrX7WQq1NY54DpQg89gtCwIDAQABAoIBABiSSfLFdlucDr8V 8 | SzzwKkf1W/Og48vufC40Xq7vLdjjSiK002Aqyr+8Y6jTPGpZ3+IOyc1R3H/bUI53 9 | 1yvDCWkDhjDXk7apEH2BVZW0Z6YAYOlmHDe1L8UbK5BkDh+YdRBDFD2MMlEoYa7b 10 | KTVLRkOXrTA2XgvDjC5zLoUctTDcd6NNKPg0QU2yFRePLzyoE7+/gI3rkr2HS/Wb 11 | OhR5qucuvmCRo7+8kxsyLO5NQiEz+iL5711dElg6Joz7wYIYi6IUEqMUPuIeCP5H 12 | gbMOvZADZ4on2/Hf0Olu7fNmt6TGLKCRqiztm9z83imXQFPu4KRJS4DoZypMNBDc 13 | 5snTkuECgYEAx0Qcl41vwGisW99QQQ9BPJjb39aTnd7MxyVOE1HpJTfRvFcZN6sN 14 | ktkQECw75JrjZ0meOZg79DX0CjsiGu3MnoM9mSD1CLcbHtaf0OeciMr5fL0329PF 15 | zgEQwdPe+e/qAwEWtXsCIySjdHZ4RjDo4TufwK13Cn59imivyfvEJ2cCgYEAwDLU 16 | lhtZTbGyAvyt92AkT4+Sur3taij+UJJpwRtRA/IjENg91f+8l6Cn+ueVSiifz4Wm 17 | 7lHv53xGP4busyahg7GnjCykmnbkB7jm1/y491mxEsKvR8HVkrmvKXTkzDqyhN5X 18 | /xnAlab4132vAra8vmCXVASfXcjGkvZBYxTAer0CgYEAsAMhAlljieCrxqc1+5He 19 | /QjExy6By+Q+m/X+xiAHQeHReHyzALIuVjU39CEuclrCXbzwb01iP+/cdaEQGhtN 20 | MAMbSQSMjLs40H+iQWQkp8wqnh2BlsK0KahVRfDBN6LM4QR4K6vREnvNihUPXmjb 21 | fAAvt4FB8loSyEx6Yn7qICcCgYEAhTI01Zo6d3eQMDXAslE0mNadD0GUiR/Drz7o 22 | f2VY7e0elAvoPqguoL4768wWUAB7UCwFld++7KPZYyk1v34kLMovnRtLL6j5OsjP 23 | YhvIa9MCvkehhY81XavFUmuqLEb5dM9KGIZWSuAeT+jQIodVonH6LcXOVAZSZ4K1 24 | qd61zdkCgYEAvPgJ7MPE+WQErJ+8etf1cv2DYgz8Qeblr0+/4Bkgu21V0HNbdzgQ 25 | noFgOKwH1IDXBOLMlyirQydFcmTOdBM6J1FwXtL6UWsVoDS2IrQ0nCpWAm3GTv28 26 | r1vWYKLhJbbMUHOHbQysAEC7NDhLRdVmm/7VHkbYRHOv1poI8efY4BI= 27 | -----END RSA PRIVATE KEY----- 28 | -------------------------------------------------------------------------------- /keys/id_mldsa44.pub: -------------------------------------------------------------------------------- 1 | ssh-mldsa-44 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 sherov@Ivans-MacBook-Pro.local 2 | -------------------------------------------------------------------------------- /keys/id_mldsa44_aes128-ctr.pub: -------------------------------------------------------------------------------- 1 | ssh-mldsa-44 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 sherov@Ivans-MacBook-Pro.local 2 | -------------------------------------------------------------------------------- /client-cert/user-key-cert.pub: -------------------------------------------------------------------------------- 1 | ssh-rsa-cert-v01@openssh.com AAAAHHNzaC1yc2EtY2VydC12MDFAb3BlbnNzaC5jb20AAAAghD83cfwT50coHTumHwN+WPsvmO3Y7l7VDOP1GKG5aO8AAAADAQABAAABgQCkia8AAopHLX0r3VwRUqIjI4f5A/oFGRPEgvZ9woMsPO5keo3NHD/bOx59ehPFYIlTWKBB1JQdladhrc3fZhEYR+KUZ3fh+onv7/X3WS1TDSVf+XOKDstRyDq98UUXARrsvq3oZDDdk6caPltxOsjb6+XJXS3QSNperT2irZgc3MhLjxtxHJLPAuikAyHmTsu2Nr8Tm6vOFMI7Zk8M/95/3F1bVuqt/JDR/jYiISHusZ0hcyqhU/UCnnXf0UXEqjMl+1DN9tVNnOJWU6HYG0CUrbbpwJ9NeDq76tP6/XzBWELWrcx+JlyjXBemr6yVPr77ht2rImRSvZEsQmIIF9HFoxEhSKF6TMAbVfcN+dvwMTtSBN2Z7qJ0sjVVLJRVlyx2RNniFqgtrVrjSQ5v+4kgHPjg6jrtzPSIbMbYeBhhnjCYDfNluBWqUjUvLFigl9OioRVKdOuxZV32Ya3tr3zRZHZORdJJzxMshj8Nm5npIfmLhDMZvrc02ML+e4iP/pMAAAAAAAAAAAAAAAEAAAAUdXNlcl8xX2NlcnRpZmljYXRlXzEAAAAGAAAAAnNhAAAAAAAAAAD//////////wAAAAAAAACCAAAAFXBlcm1pdC1YMTEtZm9yd2FyZGluZwAAAAAAAAAXcGVybWl0LWFnZW50LWZvcndhcmRpbmcAAAAAAAAAFnBlcm1pdC1wb3J0LWZvcndhcmRpbmcAAAAAAAAACnBlcm1pdC1wdHkAAAAAAAAADnBlcm1pdC11c2VyLXJjAAAAAAAAAAAAAAGXAAAAB3NzaC1yc2EAAAADAQABAAABgQCXUPd/jhasfUopGIL4E2s+gOwoN4aug+RX92vxlkdueJRUbftgFhr7PJPb6yyKFUc/lRtbsTmS+97ojtTbN/5Ppq2bfQBpcv5wk1swdOlg5M7RGN5eRPNZgtzqs6kWPI5ykAaMllIArR0vok8+pdiOWNdqKyV6QCqrDv+wzuMrEiM7//KCUvEUxBf7NyIHmXUtTJaSp+jdsK1whIL6DCZ93+vzIc20+HsNeV+ZonmTeFqbsYgeeRvwQaEkglgbODg8aEkaiRWgy6pfwenZtIzNf/pUyIxS/dD6Jst3s0BJ6Y+3kXFEfEVhgUjC/wzG4fMt64E7sfeSBN0syPXEL8XUh911YRDzVaSBgWnQMX3DnnH/5cp2Vu/sQGqjaI4br16IazncVrApf3/jthb7STdbg9EndPFkkA1uy+EMicE/eCHCpV9eUPDk3DOb0I0dJk5wYtY+PycDe8Qm6bJM+5sng+iRF7PBo5p38PpTMEcA4TwJqPPu3HSAJpw+qkDYPVEAAAGUAAAADHJzYS1zaGEyLTUxMgAAAYB4YSBtIaDwGJRPx80IZqn7bEWE4Fc7xRXVUWywCO8N4kCaaJjaUPTElEBEzDDQoTWFoQkZWjF+DUJ+9SRnlnM3bGBtCFR2+xG5ffMtVNhjTq2Nr9EZtidlAuPSgz5igfqm5/UiHo8oj1iiiVZl+72nXTMRcG8GkiqVSjZVCUUawFrzp4JV1hiYseV0Ah4Xzqfj69WYphooCyGh2D9mbgkt12BwnuPoxvKaSdDLHC4TGTZ+E1NEaKU4+TqltSadi6z8r+nXTAh/mQ+eX3RDfhPz7tIojTsHdcGEILeV5CJT6V/n5fzAEXfeaD7sDxlHd6JfFq3gHCUlxkjXRlPwlZXzm0v6R0wRAwBNSaAWg6UcMh21S6WhBvPuT9uYHdAdw+14zRs0HWm9msn8gT1GxWSQNVGEjK8wxNdUZxgbH0MYn7LKa92p8856hw3ts2BIVCpGKykx3W9wuUgKdqsUf1kxszDgKtyCBWSk8M6ypE/Sc25GAOVMTBVCmE7ltU45Dog= hello@termius.com 2 | -------------------------------------------------------------------------------- /client-cert/exp-user-key-cert.pub: -------------------------------------------------------------------------------- 1 | ssh-rsa-cert-v01@openssh.com AAAAHHNzaC1yc2EtY2VydC12MDFAb3BlbnNzaC5jb20AAAAgc+Zz39uZZ98zsDHMRCfizRUneNeFhj6VbCpDeSYPk2EAAAADAQABAAABgQCkia8AAopHLX0r3VwRUqIjI4f5A/oFGRPEgvZ9woMsPO5keo3NHD/bOx59ehPFYIlTWKBB1JQdladhrc3fZhEYR+KUZ3fh+onv7/X3WS1TDSVf+XOKDstRyDq98UUXARrsvq3oZDDdk6caPltxOsjb6+XJXS3QSNperT2irZgc3MhLjxtxHJLPAuikAyHmTsu2Nr8Tm6vOFMI7Zk8M/95/3F1bVuqt/JDR/jYiISHusZ0hcyqhU/UCnnXf0UXEqjMl+1DN9tVNnOJWU6HYG0CUrbbpwJ9NeDq76tP6/XzBWELWrcx+JlyjXBemr6yVPr77ht2rImRSvZEsQmIIF9HFoxEhSKF6TMAbVfcN+dvwMTtSBN2Z7qJ0sjVVLJRVlyx2RNniFqgtrVrjSQ5v+4kgHPjg6jrtzPSIbMbYeBhhnjCYDfNluBWqUjUvLFigl9OioRVKdOuxZV32Ya3tr3zRZHZORdJJzxMshj8Nm5npIfmLhDMZvrc02ML+e4iP/pMAAAAAAAAAAAAAAAIAAAAUdXNlcl8xX2NlcnRpZmljYXRlXzIAAAAGAAAAAnNhAAAAAGLOTCgAAAAAYs5M4QAAAAAAAACCAAAAFXBlcm1pdC1YMTEtZm9yd2FyZGluZwAAAAAAAAAXcGVybWl0LWFnZW50LWZvcndhcmRpbmcAAAAAAAAAFnBlcm1pdC1wb3J0LWZvcndhcmRpbmcAAAAAAAAACnBlcm1pdC1wdHkAAAAAAAAADnBlcm1pdC11c2VyLXJjAAAAAAAAAAAAAAGXAAAAB3NzaC1yc2EAAAADAQABAAABgQCXUPd/jhasfUopGIL4E2s+gOwoN4aug+RX92vxlkdueJRUbftgFhr7PJPb6yyKFUc/lRtbsTmS+97ojtTbN/5Ppq2bfQBpcv5wk1swdOlg5M7RGN5eRPNZgtzqs6kWPI5ykAaMllIArR0vok8+pdiOWNdqKyV6QCqrDv+wzuMrEiM7//KCUvEUxBf7NyIHmXUtTJaSp+jdsK1whIL6DCZ93+vzIc20+HsNeV+ZonmTeFqbsYgeeRvwQaEkglgbODg8aEkaiRWgy6pfwenZtIzNf/pUyIxS/dD6Jst3s0BJ6Y+3kXFEfEVhgUjC/wzG4fMt64E7sfeSBN0syPXEL8XUh911YRDzVaSBgWnQMX3DnnH/5cp2Vu/sQGqjaI4br16IazncVrApf3/jthb7STdbg9EndPFkkA1uy+EMicE/eCHCpV9eUPDk3DOb0I0dJk5wYtY+PycDe8Qm6bJM+5sng+iRF7PBo5p38PpTMEcA4TwJqPPu3HSAJpw+qkDYPVEAAAGUAAAADHJzYS1zaGEyLTUxMgAAAYBDYySRpc5jxiHIpznRGhtoMoPklLE4kUQb/0FbYUiyZcQvjXiEwluRF5FvkcmWGB3njjoxy6AFmGRp4It8CKu3Eyx7ThekWgHQFUWtuNp0Eng26rPHYKlOpKHRbJCnB/Rh6/CgTXyLzsPvyCBlJiHnlc3uSYzElfYXL0gsGdSJhRIFbEPhK19Ya/asTtUJo5ksymXcFvv8AxGHvNj+GKWWhT8HArZqL0Zd9zcFSRljWwGscUKOfotmAsWdz8rwx5Rx30Cac+72+Qw31f5UnDTMGZkdYbzum0hYAbdthhClKOpbG+u0BtoIFS7MC2BS1TNyYSYBmtKTbQLwn0yx+UrXCbcREHKt/K7l2vL3CIWtp4cc7FIV3znCxuvZV0n/adPLl4LnFdU4uODVw0BLXgkvT9I7cxjD1PoPxXxVLdiriX1IM8AmKbfySsWZitIZ7V283OgqLmshChJbG3PdjiPJ9uX9jbahAENybp08xsL9vflIgeRs4SGtRGnYxwd27i8= hello@termius.com 2 | -------------------------------------------------------------------------------- /client-cert/user-key_ssh-dss-cert.pub: -------------------------------------------------------------------------------- 1 | ssh-dss-cert-v01@openssh.com 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 sherov@Ivans-MacBook-Pro.local 2 | -------------------------------------------------------------------------------- /keys/id_mldsa65.pub: -------------------------------------------------------------------------------- 1 | ssh-mldsa-65 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 sherov@Ivans-MacBook-Pro.local 2 | -------------------------------------------------------------------------------- /keys/id_rsa_pkcs8: -------------------------------------------------------------------------------- 1 | -----BEGIN PRIVATE KEY----- 2 | MIIG/QIBADANBgkqhkiG9w0BAQEFAASCBucwggbjAgEAAoIBgQC0+YE2eBhbga40 3 | /CmOvdTBTA8RmqJ+hKWkFC67pM1vvqcBbKbr6rT3EZqtHU05kQpNFGkdyArUn+OG 4 | Y+uTvmAPVn323MNDyoOHNs11HtAPm+IN84420lS14/2QSoybcwFuHU0g/fbuXtgM 5 | c49a6stvuCD+jRijUZXkT4aTRP100hghilvNWpapbGX8XCymumBhe6rJa0qZMsxc 6 | itbZwNhgXpMbScr3Fb+ovNzbf8b3csMVg2PF1FdnlVY5G42aoMWmnxLgoWh5Ajkr 7 | 9tOkxtQFMz5eBc13qLBiuosaMk85kJTFOUCA2LXw7hVpGuBG0GmpT18a7As90zEF 8 | jwoUVUhhuG3wo5p6A0dWu264S7H0i7XWJBMFk582suH/cYGVJ1FYC7+pbwwnhSgR 9 | esQHSD3V1uCuKzahkGcA2lKD4RC72jmTRiCPl/GadNfkYWvomzGycJyZhp3675/C 10 | yqZFQENjdtEVevXUn0EQkbCWn9Kp85gSmB5xUGqEYrkLV/bjeecCAwEAAQKCAYB3 11 | r2Ki8T26lsLtS674NdcUlwaIL+ozHeql3qshcdZjhoTQTlj+QNS5aS0QPAasgZ18 12 | aHk0Nu3ivHMul7pelVLWEe9waYPBu5bMv5OVV3FmQUN40pBE9UkMmeFBoevnimFx 13 | v3MY1JyP/K2JXot6JzmvguhfMFUQ/Y3R1j47+y5cKe3HkMcxwi1NkuDHyvXEthGz 14 | pqPGXWyScKPyt+drTzxKT4GeVGkki3+bSnwNti2RzJX0DlbXqJy9ZmgFkJFPp+6y 15 | cqGfWYgTptJK4CVjjb4uCd5LMbUROsuNARZa21hsYgxNyzeMdD1WXXECAUMejZCT 16 | 2zCzVrDbeR2tO7HWh8STDt/Ex7UfOuMV5mSISWwAw8BaxhDRkAOt23iTnz9nUGff 17 | QQwX1uCVIimTTeJCnC/N4ouubQZ4SgkMS2pX8GVL4KPs4F7nz1+dK9ktxX4vTjDP 18 | GflP+EMuKWw5fEvWB3W9u6viholPRphgc0nklX47wRxv3zNWbVsFlknTdYOr2NEC 19 | gcEA3glI9RxIPoFLuNi98rl6mc/cqlFzPLhILsN0H+Cuavb/WUaHrxzaoZ3l8O9m 20 | A9lBEeAkO/y3WrQdCatjMrXUhhChtNLBdJtcANH/BMf+q5PXVkFNeIOz0V/40rBE 21 | lsUx5kHUI+aYkpbP48Ez1Hs73E2Z26cBiWxpLluj40Lz8rAB7wF6PCdqkt9UKi7c 22 | VnqfXzaqYPnbyJbcwLthEljDXS9AJbuaSFNosDMKBP6YRI22/GZy5/IWAz3t2TOB 23 | c4rtAoHBANCoSZtouxQVFjfcXgpM8LvYrti29iscRqe6om5NBnu6ksnOMCsNprn6 24 | 7z7K2iwvmDFM6/Hl+4BOPZxoh72qlfIOY5WJ70uBHVXhJyE77DX8dTH282NDRnOK 25 | OolVo6I7JQi34qgXmWUqpU8ZjveLRxGV4jqMrxFbX/Z/imyfyFg+np5fKM+/EFdK 26 | KD/hql6t5uMLluUO0zFu/dflWZMK9tIwBmp1a76q5RTBrVyzA4FjCwFbpXqNBLa4 27 | SGRK50h5owKBwQCd27gVG/B5D+/IEcCqSxhRNqlKJfJqHxKivK9Y4qLexZCx5iUd 28 | aMQ/10Td0TaUUeejT9ozE+8/+4IRl9pE+WWJk1WEe7qyrqnwo1xOB+qWDdwxJOhx 29 | YCF+IF+FW3DISJa7f93VUGL1BWf0Iy44SQ08CafztH6xN3RoUxrnvng1+NDHHiPL 30 | lLJ+jW0HOJ3Klg+s3+6uV7XcnPWByTawlo7/N1LCAOkltrddXkwnVOLpCmAofqX/ 31 | JexkjakGnUnR3dkCgcAqLDlkXdCiCHkLJVEkh9SIQw1j4+bxY6+sKv61iH/s9hLB 32 | ExmNOh8eq+c7K8jY8W2zWTa/F5qznhy5xi7ZWOchm2LpUI27FweU2gMMpo3hg3s0 33 | dBNRVsGgjKm0JEkEeyvLDU+UZeCtH+d1i1boFZBxr3egGdswiOVmbvTNa6YUn+Nz 34 | YwxeoOFuoyBrePL0W/W0oh0Hgu2QqjxILKTkIW0tomNJlR4H1YajoVmmyM/GkPwi 35 | dCGIGYSAYdLP4ovIjD0CgcBHI21B6IX+Vnlo7ILNxPekvSDJCCEnfsLao7Efvv+I 36 | tTF7aDjDpoiIZOfz9K2XFL4zi389Hf1QougUhBeftltF7H09+hanNrSwzWVJfhZu 37 | Rz8LkxPuvIT2yTos834z4eXX7Ib5raJxopG/87OS9d2h78nwOm6U9X4Ylvdll/px 38 | tSCzEPjWwHRw9z5ZEpGp3hdBjnLPLD9jorGZMHuU0Q2AtC0qDlIXl4k33tDlRrXD 39 | ZSylyETPKkH8htQPelXYE3E= 40 | -----END PRIVATE KEY----- 41 | -------------------------------------------------------------------------------- /keys/id_mldsa65_aes128-ctr.pub: -------------------------------------------------------------------------------- 1 | ssh-mldsa-65 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 sherov@Ivans-MacBook-Pro.local 2 | -------------------------------------------------------------------------------- /client-cert/ca: -------------------------------------------------------------------------------- 1 | -----BEGIN OPENSSH PRIVATE KEY----- 2 | b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAABlwAAAAdzc2gtcn 3 | NhAAAAAwEAAQAAAYEAl1D3f44WrH1KKRiC+BNrPoDsKDeGroPkV/dr8ZZHbniUVG37YBYa 4 | +zyT2+ssihVHP5UbW7E5kvve6I7U2zf+T6atm30AaXL+cJNbMHTpYOTO0RjeXkTzWYLc6r 5 | OpFjyOcpAGjJZSAK0dL6JPPqXYjljXaislekAqqw7/sM7jKxIjO//yglLxFMQX+zciB5l1 6 | LUyWkqfo3bCtcISC+gwmfd/r8yHNtPh7DXlfmaJ5k3ham7GIHnkb8EGhJIJYGzg4PGhJGo 7 | kVoMuqX8Hp2bSMzX/6VMiMUv3Q+ibLd7NASemPt5FxRHxFYYFIwv8MxuHzLeuBO7H3kgTd 8 | LMj1xC/F1IfddWEQ81WkgYFp0DF9w55x/+XKdlbv7EBqo2iOG69eiGs53FawKX9/47YW+0 9 | k3W4PRJ3TxZJANbsvhDInBP3ghwqVfXlDw5Nwzm9CNHSZOcGLWPj8nA3vEJumyTPubJ4Po 10 | kRezwaOad/D6UzBHAOE8Cajz7tx0gCacPqpA2D1RAAAFiCew/XEnsP1xAAAAB3NzaC1yc2 11 | EAAAGBAJdQ93+OFqx9SikYgvgTaz6A7Cg3hq6D5Ff3a/GWR254lFRt+2AWGvs8k9vrLIoV 12 | Rz+VG1uxOZL73uiO1Ns3/k+mrZt9AGly/nCTWzB06WDkztEY3l5E81mC3OqzqRY8jnKQBo 13 | yWUgCtHS+iTz6l2I5Y12orJXpAKqsO/7DO4ysSIzv/8oJS8RTEF/s3IgeZdS1MlpKn6N2w 14 | rXCEgvoMJn3f6/MhzbT4ew15X5mieZN4WpuxiB55G/BBoSSCWBs4ODxoSRqJFaDLql/B6d 15 | m0jM1/+lTIjFL90Pomy3ezQEnpj7eRcUR8RWGBSML/DMbh8y3rgTux95IE3SzI9cQvxdSH 16 | 3XVhEPNVpIGBadAxfcOecf/lynZW7+xAaqNojhuvXohrOdxWsCl/f+O2FvtJN1uD0Sd08W 17 | SQDW7L4QyJwT94IcKlX15Q8OTcM5vQjR0mTnBi1j4/JwN7xCbpskz7myeD6JEXs8Gjmnfw 18 | +lMwRwDhPAmo8+7cdIAmnD6qQNg9UQAAAAMBAAEAAAGBAIIplO01lc2E7SFSw36QfcVDc2 19 | HY+dLvA6Kj5EfpxMKDmNzTytPJ0CXj4zDfKO4TBbntEp6aYfNNFF+qVfHJRcrQjzBco9kR 20 | oUvHhj61ovfFex6lLMuctlR+XHjMWRwWtVZZDDktKZcJUzzhexdh5Fn2lD7wpIl33vxMp6 21 | g5H3KyZHq9Xae7n0QEtrhTocM1v3VbF39KTuc8jsVmR6C+iPHoh/gaUPBmeruJd7IZ8Ejp 22 | 089wNK458c2HNw3HzfCEN5EoLZ6Q8PvKnPnxKoE7a61k2q7gazaM7FvXlGP9MHeHRM55kr 23 | WkXwc0HWv402P3dVTVZ5c/xirb6MmalmiviMyn59VhJbeZWvPrAKPNxQpCwEobts8zP2MA 24 | kF4NWbbAu4veEBj0DJbotwkNdXkyEPoDmn7m8L544P2kT2wyHIBjHxw1JEgLcXW8xB7xTy 25 | Ch+2aP8CYO09tEPX/ijOy2fX3aEdfbicn+C1cBpC43wJcj0q9KVDxHYGu0Xgh7Jal6kQAA 26 | AMAsQWepqmIyCcrDP4rFzs93h10QOGphMPFgEFmmkeYB+d7w2yujnXeLtQatkOP+eyZFMt 27 | O2RYyNcXPUFdcArC4349zLzWc4mkZ19zTB6Y0Vvh6Io+PERSsmeULg/ebrMV3emjiRjC0l 28 | uBLtUB1BwJyc+/bQJNgVtUDZUAYDKLvqudxzMqH/zxm6FqfBDQ7hFWUDMYP/LrJjDrRm+/ 29 | avgpZ+XRS7C7HL348uKavudBq7QLAXS/iWOQkmb0S+orgg/pgAAADBAMZlJhiqEn21qiUH 30 | 9clQHQFZqqLCkv1qi5V3Bi4OMvzt/sJXhUHqPU4FNtawO/hqM4JkS5JRG7O/lsG3arrzMs 31 | NDzrktg1j00kywPjc0QI3sEgLy4nrt6LNMd3WmQLMrfD7I466CvGmjRfgNAg4zMp0tzXZm 32 | 8IcpIUulv9nvlNaHzf1MRIdgHYXCJRzIP91JWzmU2h3WsI/16rUvvb0g8+7plE1kLxcCJw 33 | //Hlf9aZ7FIGgHBkthi/sIiwVRQZB2FQAAAMEAw0BqDqkgQoQjzR1WCzdFqq4PafhzTTpv 34 | fVg5KIZB2cYO0Wer/orMmGB/puI2AjV2S37xao07WEhtmttEztbgSondS7hsReo3XF/E+L 35 | B5T10S7XfvjDycHelQK+cq3T/H6SFRPQIF2sz9y0DmNta77YmJ/8Mgy6FU2dG2OiNN+Gep 36 | uMlVfG0C3X2v73Kt60EaIyGi5UQTbeoMTZfgNmFpXccSvg6qzLK6ViczqhisTMK1rQagpu 37 | RlxSDt55ceIRVNAAAAEWhlbGxvQHRlcm1pdXMuY29tAQ== 38 | -----END OPENSSH PRIVATE KEY----- 39 | -------------------------------------------------------------------------------- /client-cert/user-key: -------------------------------------------------------------------------------- 1 | -----BEGIN OPENSSH PRIVATE KEY----- 2 | b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAABlwAAAAdzc2gtcn 3 | NhAAAAAwEAAQAAAYEApImvAAKKRy19K91cEVKiIyOH+QP6BRkTxIL2fcKDLDzuZHqNzRw/ 4 | 2zsefXoTxWCJU1igQdSUHZWnYa3N32YRGEfilGd34fqJ7+/191ktUw0lX/lzig7LUcg6vf 5 | FFFwEa7L6t6GQw3ZOnGj5bcTrI2+vlyV0t0EjaXq09oq2YHNzIS48bcRySzwLopAMh5k7L 6 | tja/E5urzhTCO2ZPDP/ef9xdW1bqrfyQ0f42IiEh7rGdIXMqoVP1Ap5139FFxKozJftQzf 7 | bVTZziVlOh2BtAlK226cCfTXg6u+rT+v18wVhC1q3MfiZco1wXpq+slT6++4bdqyJkUr2R 8 | LEJiCBfRxaMRIUihekzAG1X3Dfnb8DE7UgTdme6idLI1VSyUVZcsdkTZ4haoLa1a40kOb/ 9 | uJIBz44Oo67cz0iGzG2HgYYZ4wmA3zZbgVqlI1LyxYoJfToqEVSnTrsWVd9mGt7a980WR2 10 | TkXSSc8TLIY/DZuZ6SH5i4QzGb63NNjC/nuIj/6TAAAFmFnlNrNZ5TazAAAAB3NzaC1yc2 11 | EAAAGBAKSJrwACikctfSvdXBFSoiMjh/kD+gUZE8SC9n3Cgyw87mR6jc0cP9s7Hn16E8Vg 12 | iVNYoEHUlB2Vp2Gtzd9mERhH4pRnd+H6ie/v9fdZLVMNJV/5c4oOy1HIOr3xRRcBGuy+re 13 | hkMN2Tpxo+W3E6yNvr5cldLdBI2l6tPaKtmBzcyEuPG3Ecks8C6KQDIeZOy7Y2vxObq84U 14 | wjtmTwz/3n/cXVtW6q38kNH+NiIhIe6xnSFzKqFT9QKedd/RRcSqMyX7UM321U2c4lZTod 15 | gbQJSttunAn014Orvq0/r9fMFYQtatzH4mXKNcF6avrJU+vvuG3asiZFK9kSxCYggX0cWj 16 | ESFIoXpMwBtV9w352/AxO1IE3ZnuonSyNVUslFWXLHZE2eIWqC2tWuNJDm/7iSAc+ODqOu 17 | 3M9Ihsxth4GGGeMJgN82W4FapSNS8sWKCX06KhFUp067FlXfZhre2vfNFkdk5F0knPEyyG 18 | Pw2bmekh+YuEMxm+tzTYwv57iI/+kwAAAAMBAAEAAAGAFV2Did7Kkd+IR2/hCqbOQv3UJD 19 | Ot/Yd6F6Rh2YaufcoTspxvWVj3ucH9fZGii5izfE0f0iyGZykNqRNmjkG0qpB7DYY5/PAJ 20 | hUyFhe7ggc5NMh80L5MoN6BmcE+qBwivtFo2Ptzzs3H+2tuKCDP37Qa+ud0Nm+Q55t1cCY 21 | m9HNJWd+lHSPLK5XKdPt7hQgStUyXcvfES6Bmt9wSb8zYucC/vN3Mb2ifXrkzyPpBK1bHe 22 | k39e48ABKqvk5oFIK/dlo4wED06hkfIUKJqDwOKhEpOWzxvmPioktnKZv0q8PO6VWa21/i 23 | zzHgRnDLJh8x3ff8g2PTd7qT+rKpuJy/4sqU9mR4FBot0ZfxYOfxHajDgozkjBX5tZohSe 24 | 1wDp3LMrICxtQKixb2C0G00IHKZTsphIblVrkhOojoz6sm7SV9p/f0Vj/1G+qsedvna2/X 25 | qSjR0OD3OUYvdYBk5JyclND/Z11gOmpBp5fygvegBGEAVNQBV/2tOy/PLpD3GEUN8hAAAA 26 | wGC9EgHbmJZFfxmAkH9xWroO8gvueZoRHUCzWWSPQRfy2JJOXsI63XqoeAfJqY/4T9J0t6 27 | HDeakIdSjvAcUctkwgHuN41UMjerWHx7D5EZk8FlsOFdO49lf0jml1nSP+li/DnNkwRRC5 28 | J9+sWT3dHOlZzbVRaPNRjfcyw6Y9Hz9ak9UEAQDIfWRW875qfyA92iA92AmRgML8uSd+6M 29 | orme/WiY/dlcLh85B02E2b6IV3SSFXJXGWltc+GIjsEcRLtwAAAMEA1TwIWQmzgOqvEbZI 30 | WL3sqQnrF7rrzV1RTX4Y0nYrYVIjLcQQUYxK0bbKRDoQCaMzj9JzajjavIT0Yap48XuLYx 31 | c0FvypIN+BMM6i120289/bcM3nnsvt+eMldbGeoU0xlC9UvexmFAhb78wOTlXW+irwuR5j 32 | DuWkJbL/MYcN/APb5aXJ6Pzcq9BbYrEKqdf67BONSHwTOqVM8s2Nrg7H5R9gcne0OTRSNY 33 | vgR0afLCXuJVyt3KlEZ76cht9pRDjZAAAAwQDFiXKXntTkWe+P+wPXX6ztfCqO+koXGz8W 34 | fCCZUpFXCOH7ukZviV16D4VN9dzgUxaIDQln6D9hxyE0hZu7GeD2jJkG8Qb3N1PZCMFgtt 35 | TQb8l0grfhXQb7fju+hH/5U6v3k4WXBVB6NFLCmbd2WH6PO+INgkPSLAC4tvmL0mS+YV/k 36 | +oEQvmlpK56IyGRHcXOGnRQdmTBZCX9dwXy4GsFHX5BW22TiyScTNGjv2ly8w1TRdx61Xb 37 | YqewPNREoPr0sAAAAiZW9za2luQEV1Z2VuZXMtTWFjQm9vay1Qcm8tMi5sb2NhbAE= 38 | -----END OPENSSH PRIVATE KEY----- 39 | -------------------------------------------------------------------------------- /keys/ssh_host_rsa_key: -------------------------------------------------------------------------------- 1 | -----BEGIN OPENSSH PRIVATE KEY----- 2 | b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAABlwAAAAdzc2gtcn 3 | NhAAAAAwEAAQAAAYEAt7lQbg1EYfl3gVsVyHJzIRn96GuNVAhiPlNm9aI29QPfdX73s1p9 4 | ObgsdkW8UUFwEdHCrzoFA40uWbmVlbA3XcI3lp97FxdZBIZNbNkmWsvM3nlUI4p3vEZ61+ 5 | bJrTAH/SgGwDum3ABBvP5+ykp0bqYe0puFQyOl41D1UQOyKbP5dPPEXEy5vX717PcyNvFB 6 | 8J47+HZlMQyzklkOPjLjWl4D2KuD05SEOgrWyrZZDZMNBQT5+BEZ8gDh0yCNuS21rAq+AH 7 | UTa4fMI/1OC81ytMyR2Q+c8j4bBh+tSv3mqySyUKLj1zE3KrFE273te0rfp5NGcbGR0zdO 8 | 35RfftqHao7i145cbMO3X/2grinengtMLTczUHa7nV5riMUnDGGq2plzjmUvztGhf7YqWU 9 | leEObR4l2lV5U20OUEomlIXjZcvQrK//zCZ1YybEZwLgf5poaMaDWnrSvyPaZuB6/z6s9Z 10 | tXa1jQ0ssQBhEbDpdyaPmSKxUzfA8Iv3J4IqQaeTAAAFmB8pOCwfKTgsAAAAB3NzaC1yc2 11 | EAAAGBALe5UG4NRGH5d4FbFchycyEZ/ehrjVQIYj5TZvWiNvUD33V+97NafTm4LHZFvFFB 12 | cBHRwq86BQONLlm5lZWwN13CN5afexcXWQSGTWzZJlrLzN55VCOKd7xGetfmya0wB/0oBs 13 | A7ptwAQbz+fspKdG6mHtKbhUMjpeNQ9VEDsimz+XTzxFxMub1+9ez3MjbxQfCeO/h2ZTEM 14 | s5JZDj4y41peA9irg9OUhDoK1sq2WQ2TDQUE+fgRGfIA4dMgjbkttawKvgB1E2uHzCP9Tg 15 | vNcrTMkdkPnPI+GwYfrUr95qskslCi49cxNyqxRNu97XtK36eTRnGxkdM3Tt+UX37ah2qO 16 | 4teOXGzDt1/9oK4p3p4LTC03M1B2u51ea4jFJwxhqtqZc45lL87RoX+2KllJXhDm0eJdpV 17 | eVNtDlBKJpSF42XL0Kyv/8wmdWMmxGcC4H+aaGjGg1p60r8j2mbgev8+rPWbV2tY0NLLEA 18 | YRGw6Xcmj5kisVM3wPCL9yeCKkGnkwAAAAMBAAEAAAGBAJPp61oe7k4exVrslTYDBrPAtE 19 | 4ZwPfFpCrfhMX/qlVKn+59oTjRgn4kzA8Qh9O3Zl3CTgY7JOw+DvIH2ulfrMOcaJqonTXz 20 | AyUEZ3NZxGpXKAJ5FgdjJJD9AUuvL/Fx+QyU3BKKNAVtY3+gOT3uAZ1PuwL+WKS8H4NKm6 21 | Z03kx67Dx/QTi6QNPSUnZMci4PwHHTQx7/WurJeg06C6CB4c7QYDJhq8l9CZOdRF6BvmKS 22 | YGoJHqLcSdIvaaBL1i4fIITSfrkrDkcgDzGshOczEsM0bJbJ/kEtxLgZIYMzbDeuS3tasD 23 | lLWTZIAGlTu//qFK1iW4MhJQEquRfXIGpex/Y+uv418uguT5kEOnsdmenSR9Fn10kJYGo/ 24 | sYw8prCcLQWtpmmeakJbLf0CT9bYXy9zNtREnILz5asY2ldFmYZL2ij5c51D/2NgpQldgG 25 | HVKNgw/ldbKABuJWiDhKwt1MOhHfOhqSmpUUVlXvpSGxmkljlsr775IvzQCEXls/XwAQAA 26 | AMBIG5tfJ1+qN8/4IKBzWK0fMODw+eUG1dzhQqe3KfT2FlbNbH60TL9zm6YPmEgBP9qhgt 27 | mt7Zrhwm5b7gs4fnt+1Z3UUjxOe6k2Vd8mYstoqkMRkfiYIPtKqRG9IaPMcwwY/NQ/kDyp 28 | U8756Xz1/m8+zBwU1fRr+q501L/+0He6i9YVhkzLxkCPjLV/rMdoY2LblGuJDSGi/5AgHv 29 | Zl0qPri7eOrzO0bEHv1ySGJq+2rNAO5c/DOndVJ5JQ7jRAqlIAAADBAO2Esj8mTMYl2wwz 30 | BI1liJm4eRfbtcLtoOCwpG6zS687Rh5u68p4UcbL9hQrdsdUcj3V/Ns+Ejr+mYVOrJ0Fpo 31 | Tu15/oVoq5kgibQ+aMIzDOMHN6DF7p0h3vYDaE6BeN2wo3U1zaRgxO2iMUpKc0wg1TBmUc 32 | 1rf9xn3wSb3VkNKaKzVM5V4j9QrDSEoQd2oIwU+S+LiUl2ESrvM+UySFb1qcdsiL9kooZ5 33 | b4dovMFwf2PyCHpY5X6NCK315Dde8vkwAAAMEAxgUL1Ft3YUFxOkddqhenn7fqr11I2jjO 34 | JwQjyDH65UU6rfHUgT9H9oEMxKGUoFJgoEZAdrswcIAeAAzmvxOY4pqbyg3vawlROF8v1w 35 | U9+quSqoohlnGBp5taRYEMTSlVN5+QklLyfU0rKgi2fsBbNotgIRglAO2XNkEqHev2y4br 36 | rHP5xhUoDltC7sr0dxjICAgQVsduPdBjaWpYf4GEal1GR1pnj9oWHq5GlYzrGj+QgFrDNL 37 | X9+E+XVTKavqgBAAAAHnNoZXJvdkBJdmFucy1NYWNCb29rLVByby5sb2NhbAECAwQ= 38 | -----END OPENSSH PRIVATE KEY----- 39 | -------------------------------------------------------------------------------- /keys/id_rsa_pkcs8_encrypted: -------------------------------------------------------------------------------- 1 | -----BEGIN ENCRYPTED PRIVATE KEY----- 2 | MIIHXzBJBgkqhkiG9w0BBQ0wPDAbBgkqhkiG9w0BBQwwDgQIFQyIhM2q2GYCAggA 3 | MB0GCWCGSAFlAwQBAgQQcQZWQQdRqoii41PIMkPgrQSCBxDJMFzxenfEcBZzrld3 4 | QaJoGb7+/lEOaNQk/mWBxSc/8LcFIO4UrGekXgUTUNHDDV0dU638UXLQ+UoNnRsx 5 | 7W0eZZriG66P7BTIni9B5h4Gwec+2Luqfs1T8B8aF3G0SHIXE0zi0pNL8XLE/FT4 6 | 7ii3rtwG3C5pGSHz6N3YVSi0sIErlQl3DbWU0S4GX754119pZJ4ys1cgFSu9juKq 7 | 1SMMozDo0CUxcsYDfb9PbPfdqWbHjLJayqEkbm+mji4ynXt0tnwB9VQKe5jKrI13 8 | EEgVZYiAtwiOVVj3mEGY3Z3NZkmdJSTA9y5m4WGYkf1pK4XR8TzrWsOL1McT3gCV 9 | YeDOcMNXClax8gRdqxGQ+0EsNYnQSie6GDO4oyZrwAwL02BpvMbQWES58qH3lqUq 10 | v0K8NLrZWKdNuJMkGf/3vBVAK2ZWXQTzUu37+Z883LkX1Jksou2IaqOevjeVIYvN 11 | lxfrL6x1aPtgU+ZTmFbjVo0+0ROE32yVlnD8eL4pJo2SLFK5b+34N5NqQ0bICwEC 12 | XN/D/f+reQwNliTVyWzvLZUqgCysLXpUq2/w/onTJLku69l6Jj9yewhDYp7adXrR 13 | 1lL1HYQ53HmaUeE1/HK2nYnwi8vJFq904mTkdo+AQCi6Q6CoFr3cvNs22VyQDRq1 14 | DdyWZFAxW6IKQ7BQAsjSYE+11FtFhZ4NJG5kaAKrcA81kGjbVlQU4gnIS/SgOrRb 15 | pD/wRYIFdI+gR6AOLxkOLS1tVFU3p09qa3lolcw+OnEC2pBcr6p8DUbcE5AnhFId 16 | +oX6jjBL1UDwkC+Co2UMfd+/gkmQU2VKAMoghbVoMS3g9pAGF+rpSknmXsg5qriL 17 | 6C3uawP+mj3XushZuqHKLuEiyFD1p9vzeblJ17s0TdBjKEu1vC3pZmc3vHL0e7Q0 18 | vvPI1LKrtGhR9JM28ckPZ+qb8pn+w2CkwKJ5nmGHpSC4YNvykBRrm+NVwPlv/Qbn 19 | pTBOdxKuWr5ex8TJyD35U5rVEEN+bE0qielaEwbWZJ3GhwHruPO88y7q9HivwhNH 20 | CL+UAaUg0xnBLjQQHRJ8TgfN3IG/UiGuNvC+CBG2+r3i7tZ72w8TLf8udP/L9pQm 21 | 9mFig4wjNwUvgumxP5+H4uPMsxsiCJZ6X+EgWQIhjhaLFGh21T2OK4sKbaTLqL/6 22 | uMZN20y0QdTAr193BwRX9+MFulME0RekDxvXiyzVAvFJDp1kJ4jd920zQ30ZGdFJ 23 | MKhiT4o+lKBco6wpLYP1hpSQ0o0pXKkUYMFGFvLX/eO84yMfQTXQVjfb3tN3VCvO 24 | BSH8t7L9ztOJfcQc4RT2/D1RFSGyD7fq+KHOHDcipS2Tyv+Tin2GtrcfS6UHTLXs 25 | 7X6pyEQDnsHdJb4j+KoB8AJogLc3DdvyL9QUbBQrqL3D5fJdUCdQu3XCVE2drrbC 26 | Rp9eWqmdCG71QBk1EO3iXSDx658Dj0uQiiA9eOtb8Op2ScP4+pmQKaQEFNp5gysC 27 | XBQbblu2NlsOI7Lj/DD/B2m/dWTKcZiaD68ZrQOGR5JcpELrmeKMUNawZZv/p2BR 28 | AzcrtMIXdyjE367//V+xrZMKhiVkji1ZywJHncT8Q2Qn79eM7OOOhtkyG9IGTgv4 29 | 6WCuL8t8WpMhxPJ/6Xc0rscLluzBzqrQsFQVnD6P0/+xWtWGbJXAW750Fi+czdyg 30 | 1rYqgO+K/VkX9/PyNtyEBzxjbbIjrMa5utxraf8bURaD/wOT4/lk6LXZQbEQ+sUZ 31 | f0wGcEBlHFvMytOnkz/r5WqT0NIWjICJ4Aly3puQ4ot3jcsbTpLQRp5ADnXD1rXh 32 | xStppWvS6C6pMs3SfKZiN5yQdNIedA/Knh/JX+sS8YyJeUk6ksj2+liVhhfElGB1 33 | ZJ1lYdEwNG+H+V0f9otliOHEOjRFn8nwkg7NdXXiTU1DbqMlEIxAC4/n52j/DFhg 34 | KUSr39wjIZBiEvBGp1SqLQ93D0VhynDNJMTsV8slFCqlDyC8YZhOtVsX9Y+v/knU 35 | N13IKTNC1HUEE3nH9jDF4wiIzRsYAfXHN+ONgsnbJyzPqFx/QKQ8PKjMPvD35I5o 36 | KmlXUcNh4jWcAB8L4e7qD+RiS6t1WpmLkm8ucG78mJlv8rJWl0jugFcDUkwcUqr6 37 | xAPbWhgbqzX4lxTg/pvEVXeG+8u9MoxweIgoist8VJ3vzsYDWC2JIc2bjz+qksYN 38 | iQyGU5i8VTAwcTrjjvnYhueYTbDJPoO3lFXVIQ7jurnBUchiWqeegYWlBqyIjOBF 39 | WOsei2QQyubKVP+YWRkxDPHILFKlF0Vx+QdiKEDV9GA6w2pChfMg7jgrJZZVixjo 40 | F+q86OnJAu67Ov2RdoGgYwNMOe46YeeOkJze5U20AA0L8YoicZVaf9suirIRiqMk 41 | 8rROHxaBIA+IsaO0AwqI3w2mfQ== 42 | -----END ENCRYPTED PRIVATE KEY----- 43 | -------------------------------------------------------------------------------- /keys/id_rsa_encrypted: -------------------------------------------------------------------------------- 1 | -----BEGIN OPENSSH PRIVATE KEY----- 2 | b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABAGzCaq7i 3 | TP4htTLKhydlWQAAAAEAAAAAEAAAGXAAAAB3NzaC1yc2EAAAADAQABAAABgQDHszCXaz8J 4 | kDSNiYNtwmnX+lGsK6s/jCeCt1CSsQ7sVZNtmUbp2oTyGMTlszxFm+nX3wOAwMQ9wjWlOr 5 | n/pVUmzhJ8keT7c1f/tpbf02ll6MMN3QThTbywo7JbhXlRqLzOCzQAvVOMzJCt0xogGSLP 6 | O6Z4u1RlfwmcaaflCL6bl9GvIRKSegwNwLzaAdTu0ePZAAKo1gjHxS5R/NMwQlEUsFlOyp 7 | qRzplwgCno2zP/rdCINzVR33h6nS0H7D4YUremCFA7wCkyQ8XJpQSWRvFL/lmcIuYE3eNs 8 | S3//0GkeUAJ+TdNCa622w3pFQjke3RPx7gqqCGCPadfSJhwDcBkkatbE9xvQcwsBTh7hkE 9 | t+tFHSENdj/QES/TyOlFLsGv0p9+LJxtplpFr5HokqQKU2sJKHiykT/ZmNbqTAiJLaC7u+ 10 | zlHNtnyU5w+IwCg9x1tCLv36BxbHWzJAAUCbgHDYWJj4a0yRAwPe1Uif6H6Nl3F2ocTkxy 11 | YNXwsg4cAwGi8AAAWgiatGxbBbkePktErth6l6JxX+PZxft3UmxpZxJIJE1eyg9YypUURS 12 | iW7W2vo09TKet2VsxsP9n27T+h/RXsbRdpYMLRJCt9G7yN55Kkr26vFTrs4FPcNZAYeJ9H 13 | BvQVZIiKSSamQKWZseDtyscRQ22DaUujqTpGCx1UX+lzXgf0zR1CvLk7E7pokIznUxfjf7 14 | h5dmDfMfYDbn4m76JJkTq5wzIQkd0s3RtlDbuIzTX62QTVLXUbXyHhGGGid51kZkhKbf5X 15 | GaHPvy/Q4DadcL9c1zvrBuJ3oqlRc8bCip+ejlW/tk3gdklJXdrrGsDwXxBaMYJIpCxqtN 16 | +s8Dd2FtB8VcLmdbWxuC9/GO6nIm0vgi7f3pgHzGelIeCzrThJaHWx7krXiQ+4/pFTRfbK 17 | G/msgFnfvxN16UvbgqQPZXk2dHvwfouH+D+V14+c6kRWji6PyRTfnNGvSWKMk88LMa4yTw 18 | 4JKWF0j5wcTLUH53NaFYzcD4F+1SZtfaSp43j9L/nWpwE7ImV9jRbV5Ifk6uYWOE/G36rZ 19 | tNo2CPHhDfuyrk6Nq/9zYw/icf2eDiNw7UPBVlhtPy72ylwF0eX3QBDW4S0tR0ei9bDdaZ 20 | Peh0v6peGqdc5fchJ5uavuAY6no1P0R5Cn9UV8IDuXvmoZAszqLmBnwY2oPEc8DuUGjlZg 21 | xS34YpedENLr2PDt4xffD3mSb5H65GzjQnbch6uh5TaFY51e6unIbV/jahcVMgoT+ltP0U 22 | YcaQMTdQW4hyYXbhO09b/T2I63BhyHyZGELJPieSNPxKhCAod3mMjLDMDYbn5GAJ5l0qwY 23 | 9J3XWKJTYI7nebNp/yit9dOfmK9V9ahtSj4dkL+vbCsAHL1GWA7FaP8N3j6HJl8GRA4o/m 24 | ecTEr5lV6KoeqFebjhZhNn/1FvbE3Y2r3c0IpiGYzOSAgqfSf99iv8I6BBICBon4xSeHf5 25 | 9GFySRovHj+ne0DLwLdcF3Av1ybtVzFW6VERMIYVLnMlYnLqteXGA26mb6RTVQSF+J1PYA 26 | RrkWti3SpT1b2396bju2EYhAPTDKPLxlX1Avcu6jXf+0waoCo6rQS1te9q5y2SvaQMpfZe 27 | S9LehLQR7RWeCo7cBb5hUHfMgWA+gWgwjRg11ZX9ysJUTN2RBaO+2cDYusRq7d8aQh9PWj 28 | 8PRKl/jFM78fLmZH5c47rv58Bxq47uSvMRSVOx6ACS9anm9Id65z+xqmHs6jC2TgW5LVtd 29 | 4dP3UFdrP0JZi8Mu8JQ9uQi8RspA6U17136v/rXxjmnnQ7DKnW96QVhmyMncIYVoGpmzIp 30 | 65iVn7r2fsrJMqP83S//4XntoifYZSgtKZ78svJ7f0k3GEqY+2cSSMhTDKORDP+9dloc6d 31 | TCEVWvNjuM5WDPbK12Q2SAZWajgqtO8G7Pz1vuFKEyWt5uHgCNBLi+iCHK4XuA+KDzKYbJ 32 | frzqTK12TLCsBY+AWOovTN+oUV+eQfgcem0+z+dJbDDfKPK5fZznM5Lg/jaYGx5+oPPDs6 33 | gELAFs+cs3K0bn8vMWFmp0GEIzyiNfd5HT2cPTIhh9b8ZSO94w1glFjPrzVhIMmSizOq7B 34 | zRd6nLqkOvz5DEfEs/qOv9S2xtDYj2YzVnu0BVC5Ra+wCH/NMFRAlfZXdOoKyLxnk+2mB5 35 | 0k/mGMdNBvnFMMuOAh0sw1hwbPNQGeR6Ki29ZEbiekX73MhQm0gUeuG3skxh2lc/caG1tW 36 | j7bNWrQDndaavV9rsh7+8pXDW2uKjagYxOU1SKElp61CWkQHi1mLCSYhKWW0KAfop28zN2 37 | Phybhauy064b27y5UTpG/T1ONEfhY4LYEnHu2CvOZ47l3eZmjXOydvi85GOAIeZZWKJhsQ 38 | qejCr+hQPsY0kNOvThHXqZVgOIC8CyDZljeSyFqGwo3qd0Rn 39 | -----END OPENSSH PRIVATE KEY----- 40 | -------------------------------------------------------------------------------- /keyboard-interactive-custom/termius-pam.c: -------------------------------------------------------------------------------- 1 | // Copyright (c) 2022 Termius Corporation. 2 | #include 3 | #include 4 | 5 | int pam_sm_authenticate(pam_handle_t *pamh, int flags, int argc, 6 | const char **argv) { 7 | openlog("termius_pam", LOG_NDELAY, LOG_AUTH); 8 | syslog(LOG_INFO, "%s", "STARTED"); 9 | struct pam_message messages[4] = { 10 | {PAM_TEXT_INFO, 11 | "Hello\nto testing pam example\nfor testing\ncomplex\nkeyboard " 12 | "interactive\nprompts that\neven use links: https://termius.com\nand " 13 | "https://termius.com/teams\n"}, 14 | {PAM_PROMPT_ECHO_ON, "Enter username: "}, 15 | {PAM_PROMPT_ECHO_OFF, "Enter passphrase: "}, 16 | {PAM_PROMPT_ECHO_ON, "Enter your name: "}, 17 | }; 18 | const struct pam_message *message_vector[4]; 19 | struct pam_conv *conv; 20 | int i; 21 | for (i = 0; i < 4; i += 1) message_vector[i] = &messages[i]; 22 | 23 | struct pam_message first_message = { 24 | PAM_TEXT_INFO, "This is the first message\nbefore every other message\n"}; 25 | const struct pam_message *p_first_message = &first_message; 26 | 27 | struct pam_response *response_array = 0; 28 | int result; 29 | result = pam_get_item(pamh, PAM_CONV, (void *)&conv); 30 | if (result != PAM_SUCCESS) { 31 | syslog(LOG_ERR, "%s", "Failure retrieving PAM conversation"); 32 | return PAM_AUTH_ERR; 33 | } 34 | 35 | result = 36 | (*conv->conv)(1, &p_first_message, &response_array, conv->appdata_ptr); 37 | if (result != PAM_SUCCESS) { 38 | syslog(LOG_ERR, "%s %i %i %i", "Failure call PAM conversation", result, 39 | PAM_CONV_ERR, PAM_BUF_ERR); 40 | return PAM_AUTH_ERR; 41 | } 42 | free(response_array->resp); 43 | free(response_array); 44 | 45 | result = (*conv->conv)(4, (const struct pam_message **)message_vector, 46 | &response_array, conv->appdata_ptr); 47 | if (result != PAM_SUCCESS) { 48 | syslog(LOG_ERR, "%s %i %i %i", "Failure call PAM conversation", result, 49 | PAM_CONV_ERR, PAM_BUF_ERR); 50 | return PAM_AUTH_ERR; 51 | } 52 | for (i = 0; i < 4; i += 1) free((response_array + i)->resp); 53 | free(response_array); 54 | return PAM_SUCCESS; 55 | } 56 | 57 | int pam_sm_acct_mgmt(pam_handle_t *pamh, int flags, int argc, 58 | const char **argv) { 59 | return PAM_IGNORE; 60 | } 61 | 62 | int pam_sm_close_session(pam_handle_t *pamh, int flags, int argc, 63 | const char **argv) { 64 | return PAM_SUCCESS; 65 | } 66 | 67 | int pam_sm_chauthtok(pam_handle_t *pamh, int flags, int argc, 68 | const char **argv) { 69 | return PAM_IGNORE; 70 | } 71 | 72 | int pam_sm_open_session(pam_handle_t *pamh, int flags, int argc, 73 | const char **argv) { 74 | return PAM_SUCCESS; 75 | } 76 | 77 | int pam_sm_setcred(pam_handle_t *pamh, int flags, int argc, const char **argv) { 78 | return PAM_IGNORE; 79 | } 80 | -------------------------------------------------------------------------------- /keys/id_rsa: -------------------------------------------------------------------------------- 1 | -----BEGIN RSA PRIVATE KEY----- 2 | MIIJKQIBAAKCAgEAxZSkRJfIpq5wCrs2z1RIuOvnX5VmfVIDmuBwQ1LPvssDaqty 3 | qFGPjMyuxc7kPsgnNzcP4gOlFpyxSAPJxIKZEwaGjrUmVHSuoNhlrA1ZtQMwh2of 4 | rZuyRmsSCqJIWvAWBS1VPkur1oWeetq0LBrKXe1H0z+l2VeoFL4Bw8VcJXUP61wC 5 | 4CMo1Iql/va80YI/g6KScpAZhjsQUBkjvE32UWOfxDOgahFbKpEGKnqDum5d8dGW 6 | RpK6oVtMxi6hjIn0dKUMufYrSusZ91a7iCbFjdKwFY4gDJerK7FV+yBXJxlrgBjd 7 | L55u9TnntQK17XJUI1gdi2nnFD9Z4PqfzQFs14o+19Ns4DElvYWmD6NGK+9LtqWn 8 | gu7/+PmwUWFlX3mjOFIkV2ZjeYwenOhVVCKB9TIe+NcncHWaTNnZ+yMHKFyL+N8k 9 | e2fB+mFz2FO/DkIEGEMqYRtwq9CkMVqsvepUJy4DedHcEYACgMPnonwDrndZHmlL 10 | d5XO8Di5WNw355l89zEa5i9eXPHu57eYFYgJmsFUOmC3M35VhGfFOtHhuJhqm0yX 11 | SOTheBB+SenJWop+GGPVYLe5jt1BJjfEbvDGeMp8K93g7MHTvxnVmYtHcG6i3YTY 12 | +eJpvg6ACUjBZ/ufcSq6g8eFjHYuGj7IHxkoFxPa0xdZw442131WbvQxCHUCAwEA 13 | AQKCAgBISGDwVzcpA5gp1OPwZb1VKbiz10xvfJmlB4cKmjk2a78MPzzrJyuFLzyh 14 | UVdfQIpYQOSmov66jwisd/ZQ1hZ6R2DixJMJQsbAQWqwzxGKj2gpokGEmflWmcU3 15 | 7rbZzgvASR1udPCgwrF/8JMJr6NpSW2FczuRj+gF7p1mqcVUTsdMK5VBupstZqvj 16 | 4xCg9S2XUtqQ3vb3jJQjOY9BTKRYkkHY3apKI59eqz++OqQGiGoGFc8McpGkhmpH 17 | 9rdTWwT7x4YoYk7kUa5mNmzVGpobkICq4hwHf1U33uC9xs8blsklS/NfgG7HeC+0 18 | oRE9lR4C8DGe11eaqLKRBB+COItAipXakRp3golhwBCByk1Fc+wOWov5dv1N6SnF 19 | NzHcfWFiq2OPzcr3CyT38KbReagg7fYEsLwJ1k/lairGmOGNN4VJz6kJ98OIcy+K 20 | UNQytQq4YSaf1JGxTn6DXe+4/8SzfIRwkCYA9PzAR0gljA7kiP2UI09ZK9VflR2a 21 | gpry35nMHHjCnbCut7gIbqkvTHEqAqbUZ9cnbuC8ASDqkZPMSKJnjhI8zLcUXaKp 22 | ZVawpxho22OMX5px+bnW1zRF+X9jxLeiYdjBbBH5eceQWTaLUb2SM4siOIKfMu8l 23 | gbVT5GSeuahjmY7Fep05Bytnd7ZHj99Ws+ef2wq3t4CfY9UPAQKCAQEA7kbAG46/ 24 | EjNJBwVYITC5Eg7vhg7EbW5pyDBL+5vKt1YGW3g39GbOTXD2xbdm3dMylJSVTKEQ 25 | 8vAZBkEDUA8ZqU3GOhhbFy4eJvaCJVN3tok+/awdfgFAL1BMWGMvtC50e+tWTODI 26 | iU6kjRXVFPTYs0xqNcZjsOBqNCzCH8ti8AAL5w/kFf7w7chP6hVtJ42Monr9CZfq 27 | Yd1iiuW09oY76oU0MDBTfn7v4sRx+aqZCCrrB7cnpyDtcws54gaVx4p0agPSwcLg 28 | XXiJlPGTGgtFtWQZkZlJaaMnABhOGZzOn4MW+OEvt2zbRkbOZP/62eegbG4/cbsZ 29 | mu+wpMNdduJsjQKCAQEA1Eb27baS7j+2l+M8/NcuWHsGF4rdDey7+BoiQkNZUM1+ 30 | XMRDIsY0nk3ycIg1L5EtfqFWkh6P1RNQKd5R5t61VzhgCN8X2YfQXnN0amZs2OWQ 31 | dA6cgHZG0A2+8zh7rlsiqqnk8aZIE9rXIaGTGiI3/6Y7aN6MeLjCNh9Bvf0S22h2 32 | 4ce1PSDDT1UlA5As+N3gS5lbQEcDWFiU/MRn2SdniJUFjsI9lwg7l9OQnQG8Jr6i 33 | barTIGlKq5nFiy40PcNZftfFO/Hv+0FEmR+1zHldHh1+1aMOIyJrF3otS2LlG503 34 | Rt8UqU/35iiEb7rUsF7LfpsPTHXhBFWO3MGiJCr1iQKCAQEA5v5z0sNp/Iz3aPUH 35 | YPXJFPahwkaiqqv1pPsdTkjUFzQwaZB8PlVD/tNaiIaqFLZgPKZmrqkes0WMHQH9 36 | 4ikhaX5ag4uFE03EMWWc+e6XCcC37lhjJvqzbKrduHo/jt/SUSfuvAzWnDY/U/8s 37 | WWqcggW8mXFAyAJnMzmI4CXePmjtIQ3IwoIqs3oT7wziiwuwoPu2PwylTka+94SF 38 | ENFFWK/VzjmrV+BbUm27SJzYSpDA1PP8XwuO5o6liLd1kMJq5TPbp7fypurqBhjD 39 | 0OXIqHboSrxd7Skb7/2gCTh5Hy6IoLI9/gZr9Q9Dm6qFV6YzYarnmqwVwJxJlRFI 40 | lK4hKQKCAQEAsY3+Ao1AztkqAFeI7q+Jy2ZzjQOQrJIEE5zAZQ5ySZzoge2DfjWt 41 | U3A9RhUX74aOOCn5AFVh10bFOZAEj4hew+qaoTEBgOkRx77odAriJnW14u1JyEWm 42 | K2Yj/sqS4R7Hm1pp7ho4larpYO8F3Mkcb9B6RthHRL69a4mvcpuYxz7UmTtzBANA 43 | ej3srNNOWoczkehfJB+B08acL+SUPFWyStLjCCq+W3L+bZr/jeQinYG82OAWojiP 44 | xYLkcesetT6NwAP4rJBMO6u3FiEo7jPhSExBh65QJ+ElFEkUU8cPfY596uCzJn+G 45 | CdSAGfh66F8R9P77x+edZAOwcEPiPEBWiQKCAQA+zdZ3s8gIyuZWvz8dLphSjqAb 46 | pjFYc0d382y/MR00MY06epWV8jJAUCwHNOyp8DqP4WmAvVoPQh8YWxZLv8lj4Jio 47 | qmiOkpeDLe2K+LBmxzcVd2kEeTqy02/OQdEKQKKt4/OkUYdn00I8G1duh/sh9CzA 48 | Y8rf+qSxsc8ULq0mXJP2frcnCJtMa0G86AQ5OdkkHP54fWdpwqHJSmu0bF0aacbP 49 | ozrdGoZ6bNWfZFA4FCoa8kL5zgPa1wW0pHN/DQP4ynZaxKQe6+PosQx1ocSWvv1D 50 | A3D4bhB3+eqd5nqbrTGgw7u7BnNYp295OfK494ZWOsWkm0HWUzYU3IkHI5/T 51 | -----END RSA PRIVATE KEY----- 52 | -------------------------------------------------------------------------------- /authykey/id_rsa: -------------------------------------------------------------------------------- 1 | -----BEGIN RSA PRIVATE KEY----- 2 | MIIJKgIBAAKCAgEAlh43bS7pEatYxtc5LWripTT1EyNffU2yzr3VXma3lnsn4KWc 3 | BUWJmVwr1GQQ+dFt8jjkRtSsvAdpfOmk0MKdTxr3TLKx4XlaU3GmiFWkUn+1STaw 4 | Zu5g+2FEEMRvIYV5ZhILNDZgV3vcTwDcZv8FmnmsqbDC8cjgHQ9pHm2T0umeuopK 5 | WR2nxdRKMvB5TiUN65b8B01yeTQI44x4LbXjNpg7ib+txozJV33SyuVstvZxJ6hA 6 | GwzRsECUINJJUjFEmpLkywXAuTA8WKvyPGfYimF41CRrbncebaOId+qWOMfFeit9 7 | ci7DSXBVhIgLKSUM5Sz547JiR3BIyTqyd6sHRgNtWZR3xEOxk5y9IdslqIzHIrc8 8 | M5Zc9xvF+4T1A63kVnC9TgU7LmA5GfH1iHZny3D7qBJD+NWA56IbKa+sMYmMLvA7 9 | 7/YP+/FAbHxfMbREp7xzC3InvyucUGuynEzuUqoLuhxNddp8/7CrzyGE76MKTDA8 10 | fQsiJ5HKCCZC3Tq1DnaogPuBFLy+7RGukO1V7sQEUMmk8Xr7UVQizZP5NNRxTokJ 11 | YCZWLgsOGFizzLvNDneb3pNRjVcppS1bs0nT6YYD2oqHviEk8w0grQQWA9NJZCha 12 | C1xmYRmEPK6x6kEJ2jTgpggBlTlLdX0B2G2R5pD439iDD6hpPqnJHoNJtTECAwEA 13 | AQKCAgEAlF2g4iQu7euvfjZQqHavMiC45wVa5vjX9ETikL5sTCnEK98B6KPlbtEN 14 | 8IhFzuISDAf2dZrUbbHVrEMvRbRSzVAVgpRKAlJx127H7I7YLUFS5t1KUzDeYRSs 15 | tPWv8C1+4kaLFDt51HzyLJLpQlJiM152K/Are9PQzGfiuNQL+bQz0KHFAXaxznAW 16 | NWo+OeGddG5xALamoOuwrVSzolnWCqtCjM4I7edPR01v/F/rppjDFTLQyOtOgygQ 17 | PrAXD0jqSOtNfOpeo6jsu6aVbuYjugDD7sdf9nl8dVffFMWhWtT2c9xvy140XGzN 18 | 2IKspSmdKRPelhBD2d870MZWhLdgI2rRjwzJcui6jnmnQIncgKjfigqqyopUdnbD 19 | kBW+gYGR4TbfCJpgvEqgzwFvFIm6S+wGkrrtuZCYsiTaeS18fctbcIjjUquQ/WZM 20 | Qj4H0Wcy/RLuYEg5QD2pcx8TdmryYApb8EOywSkYuWoqzcylNlgrDQ8qWiXQtXSm 21 | NQb/BXUgu0rh66kX867nmdxWxfUGFGdiY9nZp1++myk6rmzT4BWQ0fubmpmpSo4Q 22 | rcNirm5RzvnfpMhigTDPNyGYt4pCAD1OhqQERZVlaUSvkEa4LkQtNbJsIrVeQtUL 23 | P38nVuPOa22MFK5KTGQ47EDHHUB1Dl1ifw+vJExOaHodVFOLUdECggEBAMYkwnXb 24 | FW6So5Q8eOs1L+r7tlKl+z1tj3nyivH9JQ0V7fixEKtrmCSgKe34IPpWv4UAh0n9 25 | /FQXz7XeOUhVOAuLjU1DMWpWFjuzzDGKasgUjRRd+K4dV4//kNStMELELoslLETA 26 | 0q4H7VLvefTWpFOobc5UFU1kgu9PnNxf37Ve8Op2kgrYZulESBh5XHL3+ZUN9+Oy 27 | l73MA4lxudISkiA1kmey4gIY2eEZK9qcTOfRmUMKDF2Uk05q7lfDVsSPNqag4WH7 28 | Ood1CAK4vhJUSTuWxIFkKjNL2PUaEqKgaJRqhc463PZcBHR9cPFEvJKCi8DBRHjm 29 | CdlIMu6L+HKkZQMCggEBAMHzi3FrT8tQM9qyOq3F90JSS/2uRu9ZStixJ2dK70Zp 30 | P8nkPoPfx+Rvt1yr+oIIA0/3BcYrQDkvSKghDysxz0w624NekuKJT762UClm87rk 31 | mQtZ4OSaC9LHsvzi11f9nDyjUpMJJea/JOozUEqov8WRLlpacsaA8DKg9J6HjCrm 32 | BpwgQ6p/rrM7HqBTUAjPBS06YLD2uZHHyfVqvjMOB1stDMGG+Jx4P8nKsqVkV1Yj 33 | p+AbIVXZhaYX5Qqu8srCi/PtgqhbBk4XUPR1mshNjuj5te3PfXYPOjSEIwSwppOb 34 | XVVWnpR5BSWZk5DdCRuJeG4qHq1Ko/evX7VVuPYqpLsCggEBALjucCytiMhFxrTA 35 | 6B6m6o1H1zg2QFJp4kJwFCydFyqqcAvvvt4vMrXkYp3/O1BLDL9m6d4uVoZqHuvg 36 | d9hB6WglHIGjGAjmRiP8wLTwOo95Vt9OgZ6INkRow9Uru2JlVgd6b2HQEhJpxZ/l 37 | cQ8KEh8ekTXElolAKVCQHpg0R0gxT2uVtOK4bPyERUHKa3XGacQrYFS9SBDVy+tJ 38 | IKSnvoifV4C/nV9VsGz+IEcOIF0w6/l89GOXGxFSjheNcntMKzbD6veXEl6A5TQd 39 | FxFmZ19dbRRS12w++0RvzDrKujDjZvU/TSIGagYLWhFlFRctDqCeAXlRQpnwX9Dz 40 | BLSDKN8CggEBALBrdTK09z8r9A8BQgjhYxkrvL3DMfjzkvZqpjn52o6EnCZr/EV+ 41 | X9g1mmesc9Cls0Wgn9rzapbZoNB2SdLzmulvPE9RznBLkIMcWOxgHmGpIGFH3x5x 42 | 1UFkrzYCrPj30o8BzNG8Z4Jt6gkypd1ThCUU+0Hqti5ECLk02W3+RAydcfPAEWzc 43 | ea/EngYd4lYw4TeTu3Ic6w1k2xrmfp34K87OuqSqviet5fAK9dcl35+WDVT3uKnb 44 | lAtR/uBp5KV0s1Mtf0Tej2ynHtdOxn1etxjKU6c+rpOeJEayzxusB8mKcCp5AQRy 45 | 1LCv8p+5v1gSAr7Kh17/3wgkuP08PWOFxJMCggEAYzSDAc+Ot5NIkfxZ7MCO2Cth 46 | PI/1JClT/oRP+G1bI+p5tnWpC4KYaaLe144T4RLJYHAkAkv1vKsGBNNZUjP6faGZ 47 | pdBH550Y3Glqa/wRQi2kA8T+o2OKyqCRUdQ1s1czM7BdB9sj07/hAVecyfSwjIyk 48 | bD8cwvm/HenLdCuBU5n4yXRUKhaSL30/EMZbVKJ+JRW3ozuTVtjXM791TkHVeSU3 49 | eW0KuU4qIWfknrXDX77+X0fcscozyq377PvZL8Mhelh0pkIazRexegYjmzwVuw7j 50 | CKTiYxpwBLOwa4v5JKcTWGc8v5teWlN8E6XyT6oGqfRYc1Dw4zCjVxfCy/v0SA== 51 | -----END RSA PRIVATE KEY----- 52 | -------------------------------------------------------------------------------- /keys/id_mldsa87.pub: -------------------------------------------------------------------------------- 1 | ssh-mldsa-87 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 sherov@Ivans-MacBook-Pro.local 2 | -------------------------------------------------------------------------------- /keys/id_mldsa87_aes128-ctr.pub: -------------------------------------------------------------------------------- 1 | ssh-mldsa-87 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 sherov@Ivans-MacBook-Pro.local 2 | -------------------------------------------------------------------------------- /otp/keys.txt: -------------------------------------------------------------------------------- 1 | 000 S33m 8:z9 056 vLdR pCMa 112 Qj2% Ucw+ 168 uLSB 5IRG 224 b:r8 RgqH 2 | 001 xN4P sv5f 057 :CRn 6+sb 113 2jcF f9m: 169 %tCG hQxX 225 n9YZ 9yhn 3 | 002 BUUZ DzYQ 058 kqcV vrmE 114 H=9K krJ8 170 +sMz 9UF7 226 ca+Y a7CJ 4 | 003 vasM +9AB 059 zrVF twuj 115 2f9m u8ZN 171 FCn4 do:O 227 U=jC dCsf 5 | 004 kyVz q%7S 060 ueg4 QGai 116 S26% FI6R 172 UW3w knwk 228 fhOJ OR+S 6 | 005 zKYI FxAk 061 zAYJ 3G6c 117 9ju6 mxG= 173 qtKY +COS 229 jFiJ NFFH 7 | 006 MTXj =evy 062 Fwd5 5hqL 118 r7WT kAzF 174 9JBB 7BVN 230 BNWS 5BIE 8 | 007 ttWH LyMI 063 XkJS xxFh 119 Xa6y BSKm 175 GM4Y 9PEu 231 e7Xd t5D= 9 | 008 aQ3b R7gf 064 U=Da RxMf 120 j=us jtR: 176 bp/f WPo9 232 LeHN 54K+ 10 | 009 rGq8 cJi+ 065 ChFR gYIF 121 YICd m2aq 177 bjn6 EO:q 233 khGm jT:A 11 | 010 DSQg M:eZ 066 w:3m ajtA 122 r8yb XCHh 178 :Z2f uPfx 234 7FrL a75S 12 | 011 Wai5 qdby 067 tS5g NZwU 123 VeGd Nv+M 179 PjkI p4=M 235 iKcm +JiD 13 | 012 2RMB ukVu 068 h%J= aOpp 124 r9=H Y9re 180 Boyn Oc4s 236 c4Sj mIUf 14 | 013 FtqK B7+k 069 CzNA S9vk 125 eMyC KzEv 181 8gp7 DfAB 237 QGnK +5h% 15 | 014 ajPD JSIL 070 Mec5 HNge 126 GN/Y bumu 182 Xmpp nqB= 238 9Ysp Q4=5 16 | 015 WT2y WD6I 071 ONNB %YzI 127 a/Yi yG2% 183 daQY Lioi 239 CMDU KGM: 17 | 016 Q8IK IBIq 072 PEBu M=:k 128 MVBo BtTu 184 AEEX dSVD 240 eT/w kr+T 18 | 017 BH8L MOAo 073 G+qO 2m/D 129 BzJs aL=s 185 /RYf Vw=+ 241 VuLL MMC: 19 | 018 8BFL P9NC 074 393Y P2E7 130 /bba JSvU 186 KMVq 7t5C 242 Gok5 EkMr 20 | 019 fysH Y3iF 075 V6Wk Fk7E 131 WaTd GcGP 187 eTbI oBEH 243 %V%h 765H 21 | 020 smOB 383A 076 mt=8 gkmL 132 cT5y kP6a 188 j+dz u52o 244 6Uik iNC3 22 | 021 89IR nQBG 077 9:vK D9/j 133 GMAh RLRF 189 sPne 7mde 245 OviY 5wPq 23 | 022 SZrO CGfX 078 Lf:e jrY2 134 LLwh Bxkk 190 g3OK M/Ok 246 up%Z HXoH 24 | 023 nG2B AbLX 079 =Rxj 4ZoK 135 :+qJ +sJ9 191 4zdw NB7f 247 7shK 5woG 25 | 024 /bWI i7VJ 080 :vID hJGG 136 S/BL vubS 192 sdN5 WCc8 248 xnJ9 FZOv 26 | 025 pQRQ iJyC 081 jaX5 PMPH 137 QtRz f2rH 193 HW7E u68X 249 rjZq XsFE 27 | 026 t7nI 98cH 082 6Jiz KLNs 138 2niC wPiZ 194 vWiT oM9T 250 H5Rz 48A6 28 | 027 z2iV tRgb 083 w5cY ig=h 139 K4Th k497 195 xP:2 Ug9o 251 IY=k wmMC 29 | 028 3=33 VLnF 084 +TdY CtcU 140 WfxB MUu= 196 m8M2 cz3T 252 XuX5 Wkep 30 | 029 /w2u qVMc 085 Opm/ rsiq 141 GjuN 8n:c 197 2Dom r2=e 253 J/CQ OL8m 31 | 030 jPSs krP7 086 DXEo k673 142 Y9=q oLd6 198 eRzi n%kU 254 GLzO x24Z 32 | 031 EJhI 33Dw 087 VYNs qqSO 143 IiTi zFKu 199 N%nT RURr 255 PBeL VO+: 33 | 032 FfLv OSpD 088 gHID GJ8J 144 MyK% Dqc: 200 fcev YhxO 256 7IyM :2DL 34 | 033 Bv3S 3REs 089 7VeT bEVw 145 V5W= W:z: 201 hEoT yS=g 257 yhr: 2eLE 35 | 034 59Ys kezk 090 YQ2q OaPF 146 65GB jK%c 202 xjiR eXWu 258 7FW3 XKI7 36 | 035 PXFc PG82 091 u2pX RMdm 147 Yhr: skHL 203 yG62 I:Bg 259 CKbg dF8O 37 | 036 7Xyk KnNp 092 5zSg APNu 148 QNu% A2d= 204 jCN3 xxbm 260 xdtf Tq5b 38 | 037 ELc/ GjoR 093 g6FR sv4x 149 qAGI /Zeb 205 tRgF bqe5 261 V7KC 9xyi 39 | 038 8Xik aCMO 094 wCZ% GzV2 150 Fiaf RHZ8 206 Tghr :3eW 262 UzXz xuIs 40 | 039 :89g +4hW 095 Yapu Vdxv 151 DuNg /KoG 207 +3cL W6Hu 263 tDHE zUUo 41 | 040 9Pj+ mB=F 096 Dbe9 Zh/q 152 wfTe vhzz 208 %ODE :=t% 264 tSgB ofuN 42 | 041 Wy=e qcxp 097 ww:p 9Ey6 153 FkpT Uz4w 209 EaMB xH:I 265 YstL 2qxt 43 | 042 wRs3 DgtA 098 gKVv MI5o 154 FRra iVKq 210 WLrq DycQ 266 h=HU YsuL 44 | 043 PrjV ngcA 099 TYFd YgOE 155 Ia6d CDzP 211 Xboh tWPf 267 2KZa zrFv 45 | 044 NzhF anW8 100 ZcY9 JiNU 156 fc=R RzO3 212 :6U: UI/o 268 GAO+ tnX7 46 | 045 HNnk WXMy 101 eyUh nBRz 157 Dcdw %OAz 213 BDac o3UV 269 VV2B y8Zm 47 | 046 uT2y MwyC 102 36iv p635 158 zBN+ %sQk 214 d6cc WSIM 270 DnHI cYKT 48 | 047 qBH+ 8LBf 103 a5Uy pW+j 159 NYkd 6XwI 215 Uu4B 23%K 271 K3R5 3/d8 49 | 048 TDyt jM4Q 104 Ym2j 3QUj 160 FoCh 52Wh 216 bkII HMze 272 D4U/ +YcB 50 | 049 wmGk S2J+ 105 5d7D 24/4 161 TYgT syB8 217 W=RS zSmy 273 +q%j mJva 51 | 050 9X/a y7eY 106 8oCr 2qF3 162 GL5W :psO 218 /84G wnxf 274 7gKQ uv%i 52 | 051 7H86 G%Ss 107 mA44 qwiN 163 EdPH sZEw 219 EW%Q LP2R 275 Ja:Q D4Ld 53 | 052 cWjn YdzE 108 hbch ABhn 164 d7eZ i+XP 220 YJ/u 7RBV 276 CQyL =r9x 54 | 053 IgPg sddL 109 TpWs VyaK 165 vNSo wF/S 221 +:vQ FDm3 277 JCYs QTZs 55 | 054 dLZA pCfP 110 h6Cm 9+2G 166 UiBK TMr3 222 Pfh3 bn2W 278 dz8s 7cWe 56 | 055 Tbce 2pq+ 111 /rVO yq5k 167 WyVw n=IZ 223 NE%s v5Lo 279 ee2: 5z4S 57 | -------------------------------------------------------------------------------- /anomaly-exec/bashrc: -------------------------------------------------------------------------------- 1 | # ~/.bashrc: executed by bash(1) for non-login shells. 2 | # see /usr/share/doc/bash/examples/startup-files (in the package bash-doc) 3 | # for examples 4 | 5 | # If not running interactively, don't do anything 6 | case $- in 7 | *i*) ;; 8 | *) 9 | echo 'only shell is enabled, this exec channels kills the ssh session' 10 | # Kill the sshd that runs this ssh session 11 | kill $(pidof sshd | sed "s, .*,,g");; 12 | esac 13 | 14 | # don't put duplicate lines or lines starting with space in the history. 15 | # See bash(1) for more options 16 | HISTCONTROL=ignoreboth 17 | 18 | # append to the history file, don't overwrite it 19 | shopt -s histappend 20 | 21 | # for setting history length see HISTSIZE and HISTFILESIZE in bash(1) 22 | HISTSIZE=1000 23 | HISTFILESIZE=2000 24 | 25 | # check the window size after each command and, if necessary, 26 | # update the values of LINES and COLUMNS. 27 | shopt -s checkwinsize 28 | 29 | # If set, the pattern "**" used in a pathname expansion context will 30 | # match all files and zero or more directories and subdirectories. 31 | #shopt -s globstar 32 | 33 | # make less more friendly for non-text input files, see lesspipe(1) 34 | [ -x /usr/bin/lesspipe ] && eval "$(SHELL=/bin/sh lesspipe)" 35 | 36 | # set variable identifying the chroot you work in (used in the prompt below) 37 | if [ -z "${debian_chroot:-}" ] && [ -r /etc/debian_chroot ]; then 38 | debian_chroot=$(cat /etc/debian_chroot) 39 | fi 40 | 41 | # set a fancy prompt (non-color, unless we know we "want" color) 42 | case "$TERM" in 43 | xterm-color|*-256color) color_prompt=yes;; 44 | esac 45 | 46 | # uncomment for a colored prompt, if the terminal has the capability; turned 47 | # off by default to not distract the user: the focus in a terminal window 48 | # should be on the output of commands, not on the prompt 49 | #force_color_prompt=yes 50 | 51 | if [ -n "$force_color_prompt" ]; then 52 | if [ -x /usr/bin/tput ] && tput setaf 1 >&/dev/null; then 53 | # We have color support; assume it's compliant with Ecma-48 54 | # (ISO/IEC-6429). (Lack of such support is extremely rare, and such 55 | # a case would tend to support setf rather than setaf.) 56 | color_prompt=yes 57 | else 58 | color_prompt= 59 | fi 60 | fi 61 | 62 | if [ "$color_prompt" = yes ]; then 63 | PS1='${debian_chroot:+($debian_chroot)}\[\033[01;32m\]\u@\h\[\033[00m\]:\[\033[01;34m\]\w\[\033[00m\]\$ ' 64 | else 65 | PS1='${debian_chroot:+($debian_chroot)}\u@\h:\w\$ ' 66 | fi 67 | unset color_prompt force_color_prompt 68 | 69 | # If this is an xterm set the title to user@host:dir 70 | case "$TERM" in 71 | xterm*|rxvt*) 72 | PS1="\[\e]0;${debian_chroot:+($debian_chroot)}\u@\h: \w\a\]$PS1" 73 | ;; 74 | *) 75 | ;; 76 | esac 77 | 78 | # enable color support of ls and also add handy aliases 79 | if [ -x /usr/bin/dircolors ]; then 80 | test -r ~/.dircolors && eval "$(dircolors -b ~/.dircolors)" || eval "$(dircolors -b)" 81 | alias ls='ls --color=auto' 82 | #alias dir='dir --color=auto' 83 | #alias vdir='vdir --color=auto' 84 | 85 | alias grep='grep --color=auto' 86 | alias fgrep='fgrep --color=auto' 87 | alias egrep='egrep --color=auto' 88 | fi 89 | 90 | # colored GCC warnings and errors 91 | #export GCC_COLORS='error=01;31:warning=01;35:note=01;36:caret=01;32:locus=01:quote=01' 92 | 93 | # some more ls aliases 94 | alias ll='ls -alF' 95 | alias la='ls -A' 96 | alias l='ls -CF' 97 | 98 | # Add an "alert" alias for long running commands. Use like so: 99 | # sleep 10; alert 100 | alias alert='notify-send --urgency=low -i "$([ $? = 0 ] && echo terminal || echo error)" "$(history|tail -n1|sed -e '\''s/^\s*[0-9]\+\s*//;s/[;&|]\s*alert$//'\'')"' 101 | 102 | # Alias definitions. 103 | # You may want to put all your additions into a separate file like 104 | # ~/.bash_aliases, instead of adding them here directly. 105 | # See /usr/share/doc/bash-doc/examples in the bash-doc package. 106 | 107 | if [ -f ~/.bash_aliases ]; then 108 | . ~/.bash_aliases 109 | fi 110 | 111 | # enable programmable completion features (you don't need to enable 112 | # this, if it's already enabled in /etc/bash.bashrc and /etc/profile 113 | # sources /etc/bash.bashrc). 114 | if ! shopt -oq posix; then 115 | if [ -f /usr/share/bash-completion/bash_completion ]; then 116 | . /usr/share/bash-completion/bash_completion 117 | elif [ -f /etc/bash_completion ]; then 118 | . /etc/bash_completion 119 | fi 120 | fi -------------------------------------------------------------------------------- /otp/otpw: -------------------------------------------------------------------------------- 1 | OTPW1 2 | 280 3 12 8 3 | 238QP9KavoxM2V/ 4 | 022Uwb%9VZVELiD 5 | 1852NHAc6AkuEYe 6 | 002PNi3gQPXzDUR 7 | 006Ihnh8ebL4uJM 8 | 155q6yK7rVU2kf7 9 | 2035rxsfX4gcFWU 10 | 189g:fG=EadHRwT 11 | 123oY+ZOAEFIfHH 12 | 230NfEvJJwG%5/u 13 | 098akg5Jmp7t3+N 14 | 227qm5dGFK8Aq3H 15 | 2754+xZrsA3HaWq 16 | 021wriJ%UH%wtZr 17 | 044K6iZw8u3NcOY 18 | 244hudizqnLW4Ys 19 | 251Fk%58Y5BVBDH 20 | 088Lmy/knwAcfpA 21 | 097gaQogQ3BA7sM 22 | 0186qBHYXFdKSER 23 | 2709b5jEIHjHh9k 24 | 137sq4X/bICreo: 25 | 218x59eV6spqCmx 26 | 204pG5:=copUC:E 27 | 180rIT9biobgG3E 28 | 1606q9U96si=p=j 29 | 012jqi3hfD6WwGn 30 | 242GauBFxEm%Y9% 31 | 214CevxLyD%Zzx6 32 | 196KeOSziwOrS/E 33 | 112yuW373n7kC3J 34 | 264cNfdaWQ4+Y/A 35 | 176pjhsaqCf=V+x 36 | 140NphdCQ5MZY=+ 37 | 111eODxIh5kOzaY 38 | 06576Fm86Rsz2vH 39 | 258OX5/UfLUfccd 40 | 014%2Ua37i:rAyz 41 | 192EGYM4yQoqrDp 42 | 206O5p363aEyJUY 43 | 1467/Ltst354Oov 44 | 205sM7K8XIIkNGm 45 | 131bFXuhhvIk9WT 46 | 019pqATJxjtze7M 47 | 246NFJnhuoYTosM 48 | 0893Za+rjtCnbBR 49 | 046RekCuxuWcTwL 50 | 116+T4eZ:OfWGM+ 51 | 1012dxEzpxj//zE 52 | 260J+kRQaueM:UR 53 | 099MskTO+:PMea8 54 | 209WMuQGnMrxcJr 55 | 135ns2fxWC8AeQa 56 | 118Mbvjr9IKJSjq 57 | 226SBV%dzyEEQLi 58 | 132GJ%iup5Jte+O 59 | 225TIYdE=KrLc/U 60 | 047GYFnvAu3ytht 61 | 199DnSRR+a/CzIZ 62 | 274KDChyP+92Lo: 63 | 213AKNxeVJfzcEK 64 | 1983Ua/:QNp39+U 65 | 069IuRyKXNo=Vd+ 66 | 064chfh%TKXAoE: 67 | 095Zy2AooHKNniw 68 | 247sN9yuj:QtYB% 69 | 008:ItTWa2WO5jm 70 | 039vboVo3La8K+2 71 | 156nryG/z%ZkSfo 72 | 178IOh/mmyrTWuQ 73 | 231UK9UUO2PL2wW 74 | 279KuD+MnRs+%s+ 75 | 121huyp=pvmdD/n 76 | 262gWFrdDAwk+dF 77 | 005imIMTaos/avS 78 | 015%+/QuoKsiGrR 79 | 188U2cxqaAVsaJA 80 | 106NDaKmhU9C%Ha 81 | 1722/R/Mgmn%32u 82 | 167gTzd/IYWJy9H 83 | 273vmnyKgQSpF75 84 | 193mIs4TIfHwX=y 85 | 1583PIuO9%VMK9S 86 | 174bRxHWG3SBv6R 87 | 2419Xip9pq2SAAs 88 | 245G2MUESgzbwXO 89 | 016TD%nm/vtBbrE 90 | 145xSwMWs%TCSPx 91 | 055nrqRVU6cjTdZ 92 | 058AczyQZCgdsKA 93 | 109i/ZbIGfV+=si 94 | 045X7=zPzPaCtxu 95 | 096UcJQTymZsLVu 96 | 179f=eTwjgsQQVI 97 | 094zrKpKH74ShV= 98 | 168Z9885%tgRHHW 99 | 255YgEBzPb6KZgw 100 | 266xxkIRy5BgW7r 101 | 202ZZgHWzhaog7b 102 | 040gw=mL22DINyO 103 | 043WcIVNCSh4nbP 104 | 041kCoo7kkjLeX: 105 | 062%4u3yJ9+oIe4 106 | 190ig3ZuNM8iWwq 107 | 127XWVVqoIA%D5X 108 | 0383eAPUWH%X3zK 109 | 249Hd:fh3SQMW3X 110 | 177Z5ktyj/Kbu8o 111 | 248ZudI/pYGqLCP 112 | 007x=3F9rgTxq/Y 113 | 060/HUISepBxMCd 114 | 2548EUPWq2r=5qf 115 | 150xZz4Z:jzt989 116 | 184xPT3u6eRsfg7 117 | 1418e6QDr4D7vF2 118 | 100SJ4q+4cHFZ2K 119 | 073a3Nkx6H7FGND 120 | 0598jyEsJ9bRov5 121 | 265PNkq8KA4vxBq 122 | 0814Lcq9+/j5/BR 123 | 239hrx%mmgDgH7k 124 | 049/M7Wovk7b4ve 125 | 181mHYDHGtNUyPZ 126 | 037VsCc4=AcPcq: 127 | 001bFPTodSLDjGY 128 | 1175eyYpXuNIpee 129 | 267p/+BGjyQ9=pQ 130 | 2595JMXa8gm7UwZ 131 | 104rkeu+g3EoO6E 132 | 161BCn%SjCi:DGv 133 | 119SSXJJmDGPIsQ 134 | 208r8=ubp9VI2pK 135 | 159=Ze7n9sHGqDg 136 | 233P9qEh8j9Kos% 137 | 143ENvfI:ZT%/RV 138 | 056eWsStr2KRPjY 139 | 144sP:9wTkn4EJm 140 | 067hV8V9=EZVhrq 141 | 164mXNRkcP:=ktY 142 | 079gDMwagEW4wYm 143 | 029v5vP7VIrfA6O 144 | 169VuzOE2MgXvPh 145 | 1533=/HgBjaKhGG 146 | 235LPTfK+Br=xA= 147 | 175%gN6Sd:WfuQC 148 | 163S9hIEXvP=L/z 149 | 036y=3cI:WI7cCY 150 | 171Dt3GW4kj3UH6 151 | 066moFGP/+cgk6= 152 | 134bUTZ93Gqi76a 153 | 078/ACqdMF5LzY6 154 | 1737vDZZ+VYMieJ 155 | 216YcGsJ7mmHDFI 156 | 024fwCOEwWFJRZj 157 | 250Ap=IEnpbVpt8 158 | 183gXNftNCcfH4o 159 | 129H:mVTFZr:Po/ 160 | 068QzIwwxgpDtAD 161 | 166uazMCEUfWXiQ 162 | 076jIr7REKNx83t 163 | 1627CskcP=xD%6b 164 | 092qdaxr5L3Ceeh 165 | 256i3Cx9MH=Ex:U 166 | 124iuwrPXY7U3:k 167 | 077ALSCtS7LzW=A 168 | 126CsgPbUJ62zX= 169 | 182czUmT2oJDn43 170 | 234V=XRMag23A/t 171 | 020Gh8qMJXf25V7 172 | 115ftRsarzi:Jk7 173 | 253Knju7gAkZUA/ 174 | 025mz5YC:MhpZZR 175 | 0268YCAsifWOUgB 176 | 0322IZntJdz:PUB 177 | 133XGaovF7PKtUM 178 | 0858fEahwX4:D+x 179 | 0843vnEzLphxzBv 180 | 201%9F9GuXKBh%y 181 | 063V2/5cH=:z59I 182 | 220Aw4AhGucIWm6 183 | 151Oj5YJUDKdczt 184 | 186zrBEzUfR4mRp 185 | 195mbmbnaoqzW3U 186 | 0543:ICSzcJKsDu 187 | 004/eIctmUwWFnG 188 | 224RU%6NfL/pUcB 189 | 0173Mn2PKOEEIr7 190 | 027RfAMrf3ZZmy7 191 | 0747EukfFJAdE/3 192 | 149oU67GY3aasIt 193 | 023qtDmJxP/F6jA 194 | 050prRbVX3d8Vmv 195 | 011Z%qWVjLc6SkJ 196 | 269CdUZDA/PALQT 197 | 243wx8wJQtq9/kU 198 | 090Y%=YsVEZ%4+3 199 | 0827gMSs:UuuEa+ 200 | 093S=a=X7cUzGsD 201 | 0754DOCG8ZBCSkU 202 | 070Ho3u:Bgx%+o6 203 | 110pucgNwbXdrc4 204 | 083p/P93FnA3hSO 205 | 103qFUMcUaYhSfQ 206 | 237xwuP%cAjEm9W 207 | 191EDrIIZ4TwzB5 208 | 033XO+BCjt5+NH/ 209 | 170o+IJnUQkDVFg 210 | 2573ctPoZeFmW6r 211 | 105ED2kovpvDhmj 212 | 122PLI+:4BgKyRg 213 | 236CKFerxuEEbox 214 | 042UnvM2qP782/z 215 | 05198qgXwJSG7Fx 216 | 061WVc6TpzNz2uw 217 | 003rVUxaBT38njY 218 | 271PjKaPjIVhQk6 219 | 197e76RjZ3kTsK5 220 | 142FonUsLUzm4EG 221 | 2192ANXMKVFycxJ 222 | 010k8sSK/ytSpaI 223 | 215Lzm3XAE9KfpT 224 | 272Kfnr3Dd:DegF 225 | 276Jxny/s%WP%yI 226 | 086AFo%USkBJaFj 227 | 091D6JZfHIyJgfd 228 | 120rLXvr5Bhbrq7 229 | 212dbGFshKiZU6g 230 | 157Zv4vaWQUgbX5 231 | 1547gE+%MO9OIuK 232 | 148/CiS/cEw9H8n 233 | 02825YejQvvz9JO 234 | 229Gvu7BACqBU2: 235 | 207N/DNjkTst/Z5 236 | 048Pm5qOFaJi%MS 237 | 1073vz/u9vYY4MF 238 | 128M+sDCtXm8BtT 239 | 139hF75T9%Z9hjo 240 | 009GEaB=nIu+YiE 241 | 194Aq9hUqScKR:J 242 | 114f:%V+yD3fOKj 243 | 031zS3PD2GwfxYq 244 | 057omzw2:WQQhXR 245 | 263sycdYhJe5A5k 246 | 1385HIboZZO/mo/ 247 | 125j+=H=bnFUyWs 248 | 2118+WdGpOzY=SA 249 | 071:qxx8tKokm2T 250 | 222/mJb+=XGLXuP 251 | 102bBzTjM9oSNU7 252 | 240swB/zfJhyNpe 253 | 232f7e+Og=bWy/c 254 | 261R67yFrwzYCaE 255 | 035XC8GjCUUkgTB 256 | 108WTbb:iH+ZqA4 257 | 080oamnzBI:mqdH 258 | 000CxU8DtB5CPAv 259 | 130:=XzSfoTcNIa 260 | 113fm/xTrc/Ram3 261 | 228CRMAMR+aYm7: 262 | 052WjMcrwkU+DrI 263 | 277yXhzB9Rd7uBD 264 | 252G:VNWStk2mvt 265 | 013QDEkVgsHOtf7 266 | 147%XX9gFAJv3kY 267 | 268Y3FIUENS2DML 268 | 072%5n%Fmh5IPOp 269 | 087Aur%jhWcANGf 270 | 187HerDYHvq=hH9 271 | 034%E2wIn7SLBbI 272 | 1655MbTH2%8Q+%f 273 | 223RQA8SK5RxDRo 274 | 200uOck/X8GOe5g 275 | 278Rbp2B=8x2zai 276 | 217jbqxCb=od87% 277 | 136ImVOdERZtAP4 278 | 152i8ce5Pce6zym 279 | 210jPFKNhfe%:+I 280 | 030z7Cbvr/KvMMq 281 | 053QvkGEAk9FJGc 282 | 221ELViv6BehegW 283 | -------------------------------------------------------------------------------- /keys/id_mldsa44: -------------------------------------------------------------------------------- 1 | -----BEGIN OPENSSH PRIVATE KEY----- 2 | b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAFNAAAAAxzc2gtbW 3 | xkc2EtNDQAAAUgPoukeMHU/jbdo3VdYk1fL/QcZjm7VCTov9lePCydGCALDkUG0wyEQXoy 4 | jZSl/RAueAyEkuBtVFjP3MdgXGwlDZ4NxvTVJnVOAqkyERtYdM13yPfYnwjtW9tCs3eoWS 5 | 3mklI2olPFYbFYffM1XIThdeaAHNoPQpZuningUk3YVcrurqDCCguFIZtzrvGQEmad44eK 6 | 9vEtBvZk8pJjqDg1mPu8ky9ZAeGPeLAE424wdJ9ZpgPjDGIqTQHGQuErq3ps9bEIMw+6hp 7 | I5OCitwiPiKwxN1VHNYPSgcuAZTtNijhN3D1EGV99WResA+I29/A1HP/D8mSF+otXBrP2b 8 | q+Gmmv8FJG9qSpQXug5H9P2uxUfagVEnFtWCPNSb83HCRU43pKKlsgLhvOMrsOC/u38JNY 9 | vpHZVZqpBGCgF0PBeOWpiA5hsl+83In9AW+9/9pfZsQQrENJcF4MRjX9TZAbLlovRR756Z 10 | Jimv849wfPgDMzGykYMQmgOx8cmsYHWuxFSy7tBx0z1BJUJILgFRzPsGmFC8WQPcue6FWd 11 | wBngLS8k+kK4eCiprkcRD7U5sTiS5lcMf/wD0W4Yg1uY6GCtV4PVOHgWmL7a5wfGnXh3Su 12 | Sp1w4lCqh06COy7ft1O7JxuP3ZV/01blS2RLiEvwT4JhvnI0yq2RqPCSAk20rND01BBLJP 13 | PeDOCI+udN9cd4dq9sVzeXOa9s/d/6bL4foYDwdh0o8KFzAEP7tUXQNeDDwqunbQDqs4vh 14 | 86XZWVmgbPc0F/tCPyk5JO85hKeSOYpceUR4KWcRzDsGDmUXuErIKHqAcdpyT0b5SJ568K 15 | lDOGp5K2f3tHO4XE8XsYtBhtTJA9NGaxgLLMXx1HYJX9LXd6/M/13/jI3Qfwf0to8AiJyx 16 | B9sQHLvFRaM+HltRJGBjFSejA5C+wP2M/cSrB/riikcxZmw1hrXAtOYUJhtk9b718SLHqh 17 | LoInMY7YIkC+biRM4VYgZ1Qvgc33SZ8UuJrGMxD9jAEu6qXuMVGishQ5bvuXGEZW7gVXFn 18 | 7rPCabpD3GCSVW78xvR94bd603l3KqF/XQ/1YKbfzL4YY9Xl7Bxucaa9CGSoFRQfmbwQYx 19 | 0RvS4psvb7vMGdJ/+ijXWDXDDaKH9b53A4OH+wrIa5cCRnZycaDGq5MoyP944WXVQUNAcV 20 | zaZcmCSbm0a3zbpAqk72VTUbz9WaIKMqBILOSRjKM4F706sOxS7PNtDvaBHG+2hgLDWgzi 21 | Xq6APJKzGDiSH1FqgEuC7t44HL2DP7kMtfdegTkZtKUsTreyJUuhGmFa09cShtTuzIgYwA 22 | SlSLrvWGApNV7/vNl+saQpzrzf7tUO8AN3A3cYlcqn4kHNcowAuZGcZN6fMNCBoYgrhJax 23 | bbTeQIuVn1Pq9yv2ltuz7DwKd1B3/VD+UoxgDzKqf4f7rVYTd50rJCUIEluaXOKpH0d60I 24 | pDtI9UPJhkD31DnxcwIc/yMaXI3yRL2P43s5WOEU2lMwEvEd2ee4f0vzkA2erbJjjFDMsx 25 | 0dr9RufgNf6WJLXFzg6z87iskgP1rpTx4Mg5oMoJNhh0FnP1/PxVbkqiBJIyLUa35uPptf 26 | AyQFZy/cSKau34Xv+z3NHNdKG8J7AizCiSQMRp5mniyqoDnn7JHDwrF5xaD5SayzOsFRVn 27 | jSotXLBKHBSa1Mi/6YzA2qzuHKQb+U0usvKxJDmG3JrmLSabMjTiXFAk6K+V/rTM0FPPXD 28 | xQP3aI4uZy07GgAAD2gSLVW+Ei1VvgAAAAxzc2gtbWxkc2EtNDQAAAUgPoukeMHU/jbdo3 29 | VdYk1fL/QcZjm7VCTov9lePCydGCALDkUG0wyEQXoyjZSl/RAueAyEkuBtVFjP3MdgXGwl 30 | DZ4NxvTVJnVOAqkyERtYdM13yPfYnwjtW9tCs3eoWS3mklI2olPFYbFYffM1XIThdeaAHN 31 | oPQpZuningUk3YVcrurqDCCguFIZtzrvGQEmad44eK9vEtBvZk8pJjqDg1mPu8ky9ZAeGP 32 | eLAE424wdJ9ZpgPjDGIqTQHGQuErq3ps9bEIMw+6hpI5OCitwiPiKwxN1VHNYPSgcuAZTt 33 | NijhN3D1EGV99WResA+I29/A1HP/D8mSF+otXBrP2bq+Gmmv8FJG9qSpQXug5H9P2uxUfa 34 | gVEnFtWCPNSb83HCRU43pKKlsgLhvOMrsOC/u38JNYvpHZVZqpBGCgF0PBeOWpiA5hsl+8 35 | 3In9AW+9/9pfZsQQrENJcF4MRjX9TZAbLlovRR756ZJimv849wfPgDMzGykYMQmgOx8cms 36 | YHWuxFSy7tBx0z1BJUJILgFRzPsGmFC8WQPcue6FWdwBngLS8k+kK4eCiprkcRD7U5sTiS 37 | 5lcMf/wD0W4Yg1uY6GCtV4PVOHgWmL7a5wfGnXh3SuSp1w4lCqh06COy7ft1O7JxuP3ZV/ 38 | 01blS2RLiEvwT4JhvnI0yq2RqPCSAk20rND01BBLJPPeDOCI+udN9cd4dq9sVzeXOa9s/d 39 | /6bL4foYDwdh0o8KFzAEP7tUXQNeDDwqunbQDqs4vh86XZWVmgbPc0F/tCPyk5JO85hKeS 40 | OYpceUR4KWcRzDsGDmUXuErIKHqAcdpyT0b5SJ568KlDOGp5K2f3tHO4XE8XsYtBhtTJA9 41 | NGaxgLLMXx1HYJX9LXd6/M/13/jI3Qfwf0to8AiJyxB9sQHLvFRaM+HltRJGBjFSejA5C+ 42 | wP2M/cSrB/riikcxZmw1hrXAtOYUJhtk9b718SLHqhLoInMY7YIkC+biRM4VYgZ1Qvgc33 43 | SZ8UuJrGMxD9jAEu6qXuMVGishQ5bvuXGEZW7gVXFn7rPCabpD3GCSVW78xvR94bd603l3 44 | KqF/XQ/1YKbfzL4YY9Xl7Bxucaa9CGSoFRQfmbwQYx0RvS4psvb7vMGdJ/+ijXWDXDDaKH 45 | 9b53A4OH+wrIa5cCRnZycaDGq5MoyP944WXVQUNAcVzaZcmCSbm0a3zbpAqk72VTUbz9Wa 46 | IKMqBILOSRjKM4F706sOxS7PNtDvaBHG+2hgLDWgziXq6APJKzGDiSH1FqgEuC7t44HL2D 47 | P7kMtfdegTkZtKUsTreyJUuhGmFa09cShtTuzIgYwASlSLrvWGApNV7/vNl+saQpzrzf7t 48 | UO8AN3A3cYlcqn4kHNcowAuZGcZN6fMNCBoYgrhJaxbbTeQIuVn1Pq9yv2ltuz7DwKd1B3 49 | /VD+UoxgDzKqf4f7rVYTd50rJCUIEluaXOKpH0d60IpDtI9UPJhkD31DnxcwIc/yMaXI3y 50 | RL2P43s5WOEU2lMwEvEd2ee4f0vzkA2erbJjjFDMsx0dr9RufgNf6WJLXFzg6z87iskgP1 51 | rpTx4Mg5oMoJNhh0FnP1/PxVbkqiBJIyLUa35uPptfAyQFZy/cSKau34Xv+z3NHNdKG8J7 52 | AizCiSQMRp5mniyqoDnn7JHDwrF5xaD5SayzOsFRVnjSotXLBKHBSa1Mi/6YzA2qzuHKQb 53 | +U0usvKxJDmG3JrmLSabMjTiXFAk6K+V/rTM0FPPXDxQP3aI4uZy07GgAACgA+i6R4wdT+ 54 | Nt2jdV1iTV8v9BxmObtUJOi/2V48LJ0YIM6oBrcEHYGlbmMifl9vzekT626QBxbH51V2B0 55 | PmeXG9kD10GauMl8gNBeMeABWU5ow93SVesPjqGpeKwqiw0DzQ9mAPvjSE3oKS5JrSjs4r 56 | G1DIPsQKN5Akl7ftJUoPn9DCIeM0EoSQgNAGDpoYMJNCjQJJgJJEBVIQMJtASUCAhBqWZJ 57 | FAMBGpJMooURQQblkkSZwmaoSGQeIWREkijgwWCeAELCIWANuGaMMIJtqmLSM5DZmCYBlA 58 | UMMQRcOUDCEJYsgogCSykNsQRhIWJdyYYJyEbBCQBNAGCkkmihqgBRLFKUOQSODCiKRCEZ 59 | GISBFCAFMQLswAckQgRaKkgCI0KZzChUsGheAgiSLJIAE5BBi5UYo0JdqSYBipRFIGkkmo 60 | MQOlSSSCkZoUCEgAEkgEasGYcZhICpkSaiQYiMI4gJiGDRgVbRRBkIyEJcKCKOAGaZQYUg 61 | I5JgvFKFxIhiPEiAsjBAE5MVKoSdIQQBQyQhKXJUkYbgKwCQq0IdiiTcHAMBsnEZmSMQtJ 62 | KGCWBEQ4SQRBaYJCMEi0BRQ5ABARJWQSShI3aQMVZlQyRBkUIkC0BVpEQhIpZJsmBuIGZh 63 | AhZIEmSVrIRRTDJCSAQZvEhcEmaQGncExCSONAhAAxZlBCaeIWhVAgAAkFUaHALaSyDROx 64 | KNOwSUS0IBkwaUySkROgKaFGUmNIBtKmYUESYROTaCQJRuEgiUkGQFsUIcEECUwGhmAWBM 65 | ymiCKGDRkkjCMSRVykjYIUQSAJSdIWcRKVYYzCZBFEiAC2DEDCRQwpLBkFaty4UBjAUaMA 66 | CguIBGSCMKREDNDICAwWhiIESVyQYcmEhOPGjOAEMBBEEZwIEsIIZAsnYVgoLEIADKEiIl 67 | AYQUA2howoaIkCBhEWcMmQYRRHYozCBQQIAkQEKhMIIYMoLVvEQAkFClESbsiIjSRIEJGG 68 | jIi2MBkjKli4YMK0cBAATYIkIIQYDsKWYYOSCQAxkuGmjBuVbIOIjBMZKQsQQhsmhGC2kR 69 | RFSmQEaNS2YQQITaNIYGKWBckgKBiXQUsWbmFCURo2TqNITECUCNQWStMARGKYhWAYJFJA 70 | huO2SMG0cROibEkgJeKCAKA4RNnAScsYQFC0EdxCiYxGUQkkUZE2kRAnRGOEQcCwAVGoke 71 | pEM2S66YmlKiauj4d4giAWe7UHxcaV/3XRFjfNVGXvH4LjXPobhRU18HWhNfMgYkw7IjxY 72 | vJZLa5GUWvwj+vfZ2cuuawaKSvn7vahiPvR9cJLz8Ri6SEN29nYGh77JyD7JZF/4gSL42z 73 | /yfi7lshGmdDykOFAJA+WCcNsJGP1GMbAHGXKtDAppNaqUgbJix9jeYdBC794+TzSZ4gHY 74 | 5XWnDBvjPl8vfbq5/cgLewozCstbfmSgFHKRFI2wq+7WtV0Gkk5whE5OxXMqydwr3a4bpn 75 | FfrClLNweMCdf+gqd9K7mfRY7D0xyzX1oqE/Xhlu6RCo/rZU9d1+m2JnGx79KgWf0sF+zO 76 | OdvOkKWLSV9BQ/Ryy7CXkvcUcnYJtEafwGqVt3zkiXsEvwOoMLk5Uidmc5BUjVeRK6ooI8 77 | i3IK63NUgcMMoj+c+ykOELnMFP1JNITrYERwiQkvCoK5sqqwS6cuwtEmzDIl77udF+Uj8r 78 | h9ILaTcL2Ef4Z2XCutJ5r4NvtHQzp64E/Ddf9nBOb8RwuX8V/BQdzXoDDeOR5Lv3yOI30H 79 | OoFAg5fg9HKkpP4+57uG6G4WZAtXvOcOvXHkKWeugL8CdQPAYJFa8Vm0B41M+X2iE97hBK 80 | YbGwJDpRQ4SL0QsNyV+qjqE1DdpTY1ADnP0rtzVrAUXtcbpv7yK59PtOauLH01QCSM5KxX 81 | hmM2zoPfRnyQupermyucxAYE9s/ZOyXWA8+WCDkQB9AHBiwvVsSZmQ7EIaW46aNYVMzQN1 82 | VTBUMn8TVf7/HObVYAQSShDgpJrhaUBIQib1Iast3wxNUBXUvq4SyPtfK/85RaaQWbFTna 83 | qgnOb/8hdwF+Cm0DjpT904deRgtYQM6u+Zr68f7tllX4Xtsd8KCzkRh13u2KN2y/9NcLDb 84 | wMpNGIH8h8/MZ2iYED4w4oScxZo6zbzZbi+7QZfte6Ck8neWwnDr4Xyx6+ae1HgyhyTQGd 85 | 5I36GoiZjXJJ4hhTvsLRxSp9R2wKtHPSHXGqsEKwYaiyCZWqTZTWSLcVkpbgFw0Q0jyjbf 86 | WGHxjrkDACO/XfbXInW/wEWmYBRZplD8xAfO6itG8JVSDQzgqDq/kpbeZA4U/OgvGAqpIY 87 | hgtDP0GmHN7b2S8RoizWkGhHOAlAIsIxkQuuxHhXfRu+6gcN22jfozLmQp9aYg3WafNYdf 88 | KUWzwIY5uhK2yF7uhLcsWKlrNcOGjfxwA+ojaywNx0KocpF/ZAp10dduap+W8RuJgUlnGz 89 | dbjhHIDGAuI7Yhx0//3FSKWnMJX8j/k9oaxcWl0QE012H+35HZtzwozBJmfSQ6/DoEkys/ 90 | 0C4pW4XPzTfXZgFe9nqhYCjG1vM7Supgq8eJp9Uv2AId+aZtLBMl5DmZUdGc7GvR/jb5hq 91 | Mr+q6ptkZgmTzl4zkcaGOn2eUFDeD+Cikmg2JuQmvF7NYF9b1Fe281VAmHYDZttwVkV7Id 92 | u1bXwaA0jHfxAcMNzqjdGwGAYQ4pw1sXou3bHoP45iFWhpQeROeqEEquDkIglLJ2AV3hr1 93 | J+m3nAfBVn0OhMVl4iVqHUfwWKxsFirOi2kT2iHc3HI69VEgVq08eeL68gR7b9cYostVTl 94 | N+Ar4Ib14UT7SgDyhggJIJqcjNUs3DWGsvjYFqIZly8P7AtbY9Vp3K0kPLNar1abXOGsCG 95 | Tw5ivO2ksy6flvj25GnBSfxU/+zhAIywh29Y4zQVxVqvqtXBpF+eYD4sw5bAK2AUCB5JuJ 96 | 6M7lK0inf2rE7fobmNkdauQOx32Wdk7ZYF51b5F1JEfBOXUywDBwz1DV9kPAq5ItmDfQso 97 | o+NpAp46bekK4cHFsoAIV1Gk4j1zSxz9XhW+46W0FtXK8QQtBo8540twJk6XawsTDSPkrw 98 | qSnaWUJjbmp97Y7c2EC5xc3OsnSnOIoOIZ+GaJQOsd7Kx2nvHMWbEBBGiSSYPhMEsWdM8p 99 | E3rdJQj28ZIjQdOmw4ewHKwGC8RQ5e3Mp0WVaCtSTW2YpAokhHre5wD71c94T29k2XJoiT 100 | LQ0rUjwso6F27+MBPQtt/k+93kT8v6FETOqR8zTtq4z6SuwzguEXgpz/cNnssfHYD90Fvt 101 | lKrO1WAw7m2iXvOQMNbnebddLztB1zz9MH/yHlpEF886TWg/8VFyKv8v6nLudEpJusi4gv 102 | E+k+r9Cys/j7dA8Gh5sBeWVNsz9kvXKSbF0+QFc3nBbWAAAAHnNoZXJvdkBJdmFucy1NYW 103 | NCb29rLVByby5sb2NhbAECAwQFBg== 104 | -----END OPENSSH PRIVATE KEY----- 105 | -------------------------------------------------------------------------------- /keys/id_mldsa44_aes128-ctr: -------------------------------------------------------------------------------- 1 | -----BEGIN OPENSSH PRIVATE KEY----- 2 | b3BlbnNzaC1rZXktdjEAAAAACmFlczEyOC1jdHIAAAAGYmNyeXB0AAAAGAAAABB3iGvD/F 3 | dvGCkRXE7PkQAmAAAAGAAAAAEAAAU0AAAADHNzaC1tbGRzYS00NAAABSC6dd1af0fSOPE4 4 | uIfJZZ6gu/q2bi3R1cEXL8Sm7xSEsLSqZ92Uw4DJpkQthWCmsuSFITTHGoSwvdvWyDCyun 5 | Kb6TETl67ueMYU/+6Jf3BMD7nwxQTu4nERL+MEV/so/Pwr94rtrtofZmk7nzsy2Co6k2Gj 6 | g90B/HqTllIgHA/DiWKNzPmOLtYxxUq1M2ArDCmhOzhIVY2RViCaVt6JneIwISxnwnJC1+ 7 | eHHbbkfeFWrlJH3D97S02LpEzNGWmB0NkX7FbP9DX/uLAVEexjFW21N+vwp5yffNkJpKRf 8 | DDMUV+L0QMkNOJgsh/sMu164Cea+Re2b7A2e3TMR7Yf2BvUdzi7u80H+aEZpAu01Wujxuw 9 | 68hkCrxzuN5PvZ7NR4f9Y7yfWtRFL/8d+H8jUftYNLrWg5JLhvJYIOMddwloMYxsvNWz45 10 | ybUfriia07ayboT7iFtYpOpSUEx/aynVI1x+nbkrHzv+JJ6kvHZpAKNgFXSTlhFeNf4AYu 11 | Tmmfk/WiwtQ9Fag0ZxQpUTBa9ufifW6Wf94Zy7wQHPeKNBzApIdYzrNMhh5r/D9uCtwvO8 12 | oAVS3pkRAp4poZjkEQyoAzBe6R0p1iPyFgjMN5ACtndm4m1KkjD5X/DY+1+7Z/vsYmWAkN 13 | pD0rl/Fd/GzF7tdMgEL+2MiD4a/B5odnhOEN+a/xYD8Yi/sevqdrhmbQ/t9Xxitwq4BTnh 14 | qMWkl9VBwctaFLHfLa4WCr0zLwrtd27JIM4KMUS9HRbkevBk6m7fWEPHT6W6Hu8tZx/6JJ 15 | AI5xRAX89K/nmQSNSD+zw4bidcIdhK45DLvZiexFOO3zJY6mPXZ588/l4sT7in0Xb3x6yW 16 | Y9Xn8Y3ORYjo2xBhGYII1xhb+wHhQuH325B7XivjIPT80DP57r7w7CD0N9wwyogSOcxZXm 17 | RO7AmAC+IOuQhawZmGvD0GURBRIpmjF9vC3PoRXJi+RGvei8EXKRUekn++Fc4IyVjtRat0 18 | nbgu7DiB40nDt1fkSPuoB7/3TPJYNqLOaiwDs/wbgV8wly0g1NVL4wTqrmb4WehSvYoaQI 19 | qAKfnD7MygJU5Xacxe4tNu/zU5mSWmrHSVM210LsWC+odJ8MdDondocJPUVoZmVkEPvGMs 20 | ysiQukJh8hQMDbPIxP+COi5tNcDdJ20LleUp9Z8rC3iyw0SkNVE51g/MxbdgXTn4tNVJju 21 | d/YTRPU8o2+JTW6iRtRtYzzqu1dFu+S08jXiJA5wHYlH0jRshjUKG9vKVhGUvDPgMChlbl 22 | Q0uStjIfjHaFDoZgOYieaBDgK4trGCRv3PZ1hQQH8jUBeAwKOT1g+6hLAI0/jy66w9vlC5 23 | 5LP2RheF/7BsLTp+JTNYnfghpfPqksXXVRLxTQwTTMWv9GV5w0K7r5+2HkTmrUj8yl0GID 24 | EOAbYB2+Wie8i7oKUn+Hr+Kg+AfYZU8qWnbYTUnQMgNy2di+EQfaA5Bl+r9XNepQmPtnau 25 | X90v/0ewTnkOU+dyUQ4aDkpXpbUwwvCOlclOtwj32AOObpT5NldkNhWs5t4cMdONhKYLpY 26 | 5GRCYfg5YrNBbT0g+JCXJ5n7UNNmv57RTFCvsVSL/uqqZ+IDG7JY6L4FUe8MIcbiw4X0Ly 27 | HCxE+eiHwwhKcgvyeDUxMsWQCQ/O4K5RpFUnqcfsftK+JKJ3QLy4sTGsvzUlWIZfgPu8IP 28 | riPUFD/gTu4Ny1VUcUz//tK2huloFsScK6hCQogwcWugBrq16QRo3uGSAAAPcDoyY7B/M4 29 | Rg6p49tFu48pdH7Dh7KGHIR/J88sHXbTydU0FrJaA7lKUQBkP9UW1+yzyb3H5BR7zlPKHf 30 | hay7cVxSlIQtPdaJ679kHcuOjtJP8yXOZzAle6imcFT2xVfdN7T9GWcTkfrki4MpW1spXW 31 | OpcvSUo/MfD8imQS94kS0SNNYHOIuBuwnLP8MoSQyzf1SN6sArUtUS5FZlQB/NDngITzmj 32 | 0IcYZwdU1wIZcVuOyHfSNGc6/Uu3tS+0WA9P37+44YT17jhcHsmH/guqx76KpHW+o/GQs9 33 | Ua8Grs7EtKG8cLg2CwTFhChtYn2KKHVJWgNreAlgMCjrIchIFC1V/ZQOOlBa3X4c2EQtlS 34 | eztsO0Sj0WimNae2wfevDLGKf/K7QIMLUXwylNuAtnOnDlbXrMz1tCB60B1Ut9cTh0iM6Y 35 | QNRUGqXR8Ii+aIFBb+BCoME2xeLTysHifAJEkvEw7vddWLhY/KWomLxszw5v1j3FxmqTe6 36 | waVGKOfv9JRWR4igMJ0suanwJszz7geXc2lqz1Oc8BTMjK/bqStQtfVZhfCM4YGWMq5Zqq 37 | ybomrXtm4Zhes+bjJQ47vs4SGLtTVf0sgin7xR4VvT4YivhHXONLFdgqB6l89RfWudg7jP 38 | yUI9eVuPQLhO7tCvhQIizb3ihbe2KMBBjTbpsPNcTP0H0/fgJN/pTH4mYR4WruJSc9aVxf 39 | VWZl8oT0PE0vwI1tWbkAfGRpvLaGKjHiSPyCcwLo++0+fuGGmEbtYXveeIIYcM+612jG+D 40 | cornvkgE7kgH8uafV+JEQ2B/aGL19lwp2v/mIQJWxMT60P+xtpveoRtvwU+LAVXTzWfWOF 41 | 2odWrYGthGvbUBggNjj7fbhg6piMhPE4YuRwbYldrBAsaLKDgor34/mLC8KyoFEkWkxpmn 42 | SQwV0qgAfSxxZ/PSC751C4gYziQHd4d9x15khhbkzcR1rsaIilJrl6Wf0VlPqctGuaEXxL 43 | hebwz6a9Gsn63IcgiTwdk9nTxqmj4+f7aAAOLmOHMmmeM1HMQIqImQQw09wRbMpxC3jEhs 44 | oMyaB4i93DTzaYMi7XAi4+h04QI0dTR8RnPVBIDHekjtMYJi5VCcVTmVnM/CQd4DdArVxW 45 | bN3SWnV3Ehu5aj/CaMYOstZG3GjjP6hnt5P5X1B4X1VnSfF+szg7qwg0b4ZjlKt8l2nZcV 46 | U/2neg6xMRWiqmC1gGYnWe0HNWjplTVeXG9AJDU1S84EOjv88G7no0y2PKn2JD8FMjj3sh 47 | NDIT2hKSWGeEvYGAAHtyEjHTyYdjT7brdHegyvdOShHsEPVkHqeePowt2YdmD4xiKMlWwL 48 | LU0doJnf+K3FUX5Y/3qEgOk88YajigbdxSZHc2UiRsZnsFCAOHCEIuqAHWs+RqMDDC60jk 49 | qpjFKVR25FfR72K2SxxUT2HlmYqPqnDwneEJuJuGj6QWNKyShzQt5XRsQgu+kdNvqpwaY2 50 | 10U0wDkYpiNFaIbqsW30C5jxtFdyiq/WJRgfJdSydBoqqLp9ucS2H+bSIxVtzWuxxpVRr8 51 | Pwd+6V5T+40FToKI8u1999mEucrOEKfKm2WyMQwcbZDuwdKw94DD0yNQLseUEzxUY/jGQ8 52 | JOiAMurjZOn3CxDTY4XjjoxzOZ94unucoJ70LMrPMfNZl52/YQdTYhKIbMC/EEeO29Eeqt 53 | juEvfKWLnY/FtO2MF8eQwsh1//VRTDRsh6GLmej60m6OFLjmmKziyzvj6M0f6baO3YqDuT 54 | XzzoMFpQnUWJO2Orp10ryh59CXCqJffkN5EWSMg9WCP2Cmiby4qGpihLPYdz0MNvEFtxoO 55 | YJckKpUPIyapAMJfKOEUt2rtIjh2iRC2fIc22kFgs+T0lvFhvNE3Vo/XH9DXdztCCaEsMu 56 | yLADgh0BEnxzwYckNk8bORCcY939f+RYt3S5ATO8sF19G1RFo+yEBEDO+23VDOlg4Feop9 57 | LY4DwmOeTG93TjoSK/e72XPjkduVKlTC5K0ORTvOQrL8oTXznCDB0fsjRbwSmK0G9bwb7Z 58 | Eg1vGP+VFGQ1BmbFKG21C+CsaS2dSezwt+fWMklTmDZo7xpnkXoJ9ewn+kV3a1HZPtkowW 59 | vn0JOENfAh5xdDUFg/tGyz6uxp/J4ygDvBBDEUot4kuP7sWoNAConVJppoGDPG10PqhVyX 60 | mQhpVljBGbVrBSaNpZJpwgU3fZB5Pv6tdZq7XVI0cDuq7C9Ir0iwJrz5bWz3Jfrqjq0D9C 61 | 5o6Hno4+fWD4DF6czKjgX5t1NK6CnftkuJS/+qOZ72FVPCT0NPLTkdPUOzGs1X8MM36dCv 62 | Yj/r7czMkIxQUYFJGnq1UudAbWs3RfSRgTssfydbXU9KCpMHuhINa9OH27OrEz+9ssI0im 63 | I96yuy39W6BxKHaYPfHEldcuKL01b+Ifpbdk8Sb/WZa8bA4CRUPliuCWx2SXYeRreKtzdE 64 | USdVcAikfnoKtNkrVYHTkMBJy4vMt/V4tk5r7SAALi4J416hyAbVWNPbs4POi0/Zf6iLJG 65 | Ewhv8pwNRi9X3vVzHgGHCd1D2F3Xpo5VqK28DhTXEV86ORXLJ1CHnyGvzjVN+RidxFxphu 66 | qol3zwC81/3P33ZVnbmSadJLeGKMYJlR4XziZZWqtPEIQUEUfK1Qtj4Tf5fPn35kMYkEzO 67 | vr2zpalGXOj3djifu5oxLVZU7q9rYwBt2Jq60IUKEN9mowalceWAOQiSztuSI70su9GwE1 68 | qcDbtK59JEVY5sF5NJSgd/YpG4t7wgqxV4wYw7ASVzqmDwpQJ9CKgnvEPOzdmRfQXyEC/6 69 | is8gV/AKiSjJd+oaM/psrLRUKzTeUdPF2kawgEbuwF/9lRodUIXDyNJFLX7HGrqWt8SKFB 70 | 8XIYcz7YYtfK8PMMxfSmorvS+zIX8/QHiAc2gO2gHPzImJtHjt5M2JjinepiLw2RQutZOW 71 | m68gRB6M7Ks7zebvMtKlcFQwf4QdpULoo/ZI+nFn+LSYuBp9hkLKWUFxxYVA1D6+foPAGW 72 | oQRMZg3eO1ip14TqrsE1Fqo9SwGUUNx2EB6EprJLIpj0zwQtmBrgxcTkHHQOGnDjfnmvIy 73 | Nhvv5SvHzf9gOPwL9FHFuBZOKwzqQA2fWQ+Kh453/SE0Bc2q4Dl3QUq95tffPnxpBJCcEk 74 | gks1Jl91aHpvUAHp80i59/IigvtAsxaYy962P/XFOjUmHuz21QPeo33YavuvtO+uhU9Abk 75 | Og2h+nDaagBTafl8FEeiNp31Kbux8qb+7npdeSiTZq+nd2IiacMy8PSpEARe99DKS5bjcm 76 | o3xDTX9AxYX5CncnGevQpn3kplgIdNjyI08xLfs/NgznngifWQSlkrGqD2Z+y0VIiGNKX9 77 | 4VsJl03g2ScoL8pCrp6pyU2BiNObW0vj0/evEkQ/4bjVoQj2FLVctD6wTM7hPBRoqcbgLN 78 | kNgW/gCtHgAqqlkf2QMbwI2NY2jAJYV9IhkonrlFfNQYqvkv+1aCPGUfcyEaxHELZONybS 79 | 82ch0NBWx6Xh8hQgwjVq31trsmt0ec5Ws+EYedmrYgnTZwSycLsNtnZrJouPXKtbJC4mjg 80 | DC4aN0qryXxKlH3AR4mZWrF/3n3pNFK/ym2oRPO6WOsrnUYoRnVBgpmI0XP3rAf8JrthK7 81 | kcIaAjX9RMoGDHfjIKW4FnOy1t6Zv9gZ6wn2m8YLVq1CAV6qoHxbsq3Ug7vaUDQ58OcsNp 82 | 9FSAiaxoY+lcKX5+4QONb2Xa8EZ9xN9krGr5oi+bcFUurjTq1XMHYMkY8RLx9tgdqLUSoQ 83 | tfkrVOfchgogD+j4usM7EBlh9OzWNvP9gDdMNZLjCpBmEUclwTu0mulS2MKAIOlk9QuOzm 84 | adHTu9rZfii6UjxEXYlEf0lumUfaS+DjpnpiP/ReOvVSazLuLNzlKmEphraCmZwHhS8i6v 85 | nVV/suF5oBVkbhN14wfRsgUcoJRvRSdFSWnBeYjMuNrRCSgYFACQPhpxqqHxuktbbiBIGH 86 | LSF2W7TNsx53kibrmfzxQkoiHdMmC/m2NQU+8x4XmCcjclmjqwB/rYEXSI7iIphCSEo8d0 87 | EPjETwK9NS6Oh+B8dsDIIhJ5qiKmBOtot41XfxIo5ui4GoJncr+BeFOk+4YcZGCmSfqY46 88 | C0iBRQUQRRMd0I/hVwxZ3ikhXDY3tW31+E7S2jphKOvOT3EC7eC9BuuUIkV3nH5uD4R1Pm 89 | ROr4wCvkGu72nP5TqFTiTT99z77BBdgGlSDxbVFr7ugdGc1HhcQDBJ1mqmK050ik3a3ko7 90 | sTvX8+imoPLFztQbenOZw1clQxBFPgmOpskMueXlyYX0GGWqBUU96b9NBfZ4X+Sn5GUba0 91 | WWlppnsfT7nNRORaTWVI+T94uBkPOPp7cYWAhidzUf6CxRAJJb8dV4k/L64sTw3+/FHhJ4 92 | zmwq81QO9wFnDU26ZLZYvDP+fbODEsmx319LLlkW392jdJUX0zH1B6GTdgmL+4Vf4QPo4Y 93 | kjauzzsFxRqkmMPHpzCXpHNAqHfbQofaOyFGN7L7rVmIYvr7jkTsnBGY0VzcK3SIdqPh5f 94 | CTNoA5NFaXeo8XNCDn4uQjxPWTryHvHvHfNVDAWxfL2tCjtDTKYduDPZGXt17/zlEfXHWs 95 | cmb+yzSPEkIHmJQoPiL2vr26QDzf/5+qKcRcEfuJvP3XZ24E1I4orLn4O0sKCykPvJ3+0Q 96 | s7FbCZ2dh0rCLX9L2XR3r2XX5lylZnL/ALP4q8uHH5Duk7sByElS0DsfEHlr42R9Aps5OQ 97 | XwiGrdxDLvpPoRNl+V4XHxdI/97k9Cop3NqzE92SCLo4mSz+EAdqPvOKkr0bjVjjCuHw+5 98 | UQRzlhll/d+FFGeDFVtcFjWlv6dNYdUEhyTbV5eZMgNyNlQuEdLFroj+EuF8Z7L7wIXvOZ 99 | KPmZiOOtam667DTF24rO2YXpjwxki0Zm9qnU4yDnqwg3IthKQQkFH5BhTYOpmiZI0Uq+2w 100 | Oa+zH/Ay/AZXRmzZIU4IITf9AxZPoG/TK+k21FSozH+kJ2DXmnKfijKMCfwqgphKXTFx/s 101 | 0l9viWM7KnvbHZXzdzyJcPZBQ6B26KtzoMxptJfJU2Yzwr+iXgRrReAo0tIDCygjb2F9AI 102 | +eKtdPbC4N9gPZHpudaXKHs70NnO42FuYtaUkoQvosYk17TwUwLcNGJ3BMlvzMhDt97PQq 103 | wz8o9dxdsvzDAfBRmH1k3qqxsZHcVM2HREjOla05ZvHedPgogowMnqhIaOJWpoax3VQx86 104 | KuxIcctAq0k= 105 | -----END OPENSSH PRIVATE KEY----- 106 | -------------------------------------------------------------------------------- /keys/id_mldsa65: -------------------------------------------------------------------------------- 1 | -----BEGIN OPENSSH PRIVATE KEY----- 2 | b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAHtAAAAAxzc2gtbW 3 | xkc2EtNjUAAAegI2A99/81zz7X324E5Oen90yPthw+P49SJk2CsqK6zDAxEoHFMwSdqAT7 4 | j5nS+jL7ZMuXCwRxy2pYvcdKucO0CaOGvZhwcBqsctsEQaBmpEXraSSU0+WHzSEYQsL5QT 5 | 5vYQYTJ/c7kjUd2HI/slcHO3ovCZRUYak0EzVnxnFOfJ2uzt2C5u1SBahtdi9s3XYQFzFn 6 | rCbbKq7kzE9Ci/DmyTsvTeY8bOKIGb0VNQ2bfxtdM+Lm2dwJ5w7eScU8hHETFYwoi0mBGK 7 | hbZCm2H181iEgaz+b9TAY030FdVASYbVb+TVZqs3RYny21/HVeXNrP8hLPvjlBPnanOERr 8 | x0jn5cCfnRgatZAS8zX9jei13UMaFXcwPNKcOcDmBwdWQc2xy8r5DJzVTYxQ6OoDNyoQQ2 9 | SebbXYj0UEdwfQHsPv635U8B9ouIsv5nqyeeGdPCvi7eJ1ITcBYbUA3mSovqHQBEeBJ/0N 10 | xqpC5v3AW55yUvyXqjLNB7idyGAnTPef4bkwtyZFnsTRt9j/Il0uJLNqZn8sQBpicJnwQ2 11 | Nq5uZqLcp8eKOIgGFfkAIkS3zmvcpeV8VQq/3j2VuGZIE1q7xoTD46yHUQgcKiGy5Vjx/t 12 | 7zrPLYmngXKlGxjAZ6J/hVSGHYLx4S7dPqnxAGBjOd3Ymm8OY2heqWVwgCk52Bq7QpSdkz 13 | ttwbFBqRuP/Mo3zRjoosHhk4ph8uEuWI7Of9WhABbu0zARWE7WnxmbUlx2ZsI9sGPWySJ3 14 | 4w5ylI78ZCKHMoERYIewfNcIH2vOLtUjLkwWXag7gdZ/0Sg6kN9P5fNae0jY22jV1Qsh3y 15 | NZM4Pg6RN1ZRoaezt7JRDumRGgABlp697fwGkT12PC3/+XRrtgYIr78K1ZoIpbeH1IuHV7 16 | cpOhqAZxPqUf+2etiR1PNndytPqI5kSAmmW3rdfkdChFKuAf4Lf2XZu/3UEghg3D4XwKg/ 17 | f927iJR9lhspFqkdYvIWQHXSXLHnA0mVuHigCiZuOP4KL4qdZhcA3FoFDeg/2Cx3v1Ezwk 18 | cQnr8uZof8dt1f6pBY3cfOwzkOR6CJ5EuIA64Aqj/RMmo0/fvCtFMO/9pV6TccueFBgd/c 19 | 0sBAW7M8RmMDDZtfmdsNVUu7nCug68FzmqF34lymKlJPOPyt6+jcvFDufxgR+3M9Jwu/7Y 20 | o3Wglh+ENg5rc17sMjekDdmHPIbpSEwLumD0JB8UTcMQJkwPWKdBMC8K1UpC/Oe5KMl2Uy 21 | qaEr1AwwrBlcZ41ptvxJm2yVkx1ZrGPXBaXjOtHgOJ0XPYMYbiSBimI1bEpn8qF2RVzsFd 22 | bp+qk9KK+Pjxp4ebYZ2oHFaOHNNLpZeEP7MRYQVToFBqjbT78i9uQ0Q3QL/BVu/oPKpItV 23 | /+pih1YngZUpePIjS1bFSRr+P88owhqqcsUp4YSGUzArW73Kl6aqFE+y+9dirTiDzEqAWn 24 | d9R9g3Ver397sqzHoXN8xTIkzn7J3tJ7f+BMV7bPzeQfcb2nVPwUNF5Ra6ZND/02+xRiSf 25 | KXH9M/eooXT+mgp25+ZP9WwYE2PbG+3k2KMn3ob04UpXdOhypm5WM4aIYWT3sxUf6JbIE7 26 | PXyMiA29RNEByuYmywLpJ/qziY1dHCfybdp7yeNXM5097+73Y1GRD+Sw/FdYICsUDvNxg1 27 | DcxxG2yC3mo7sxmtCuPrevtSceN9Pd1lx0nSUUD7xHV+drzxg0OzkO7sUOnMoGsJuuKtCT 28 | PN+xKIUHu5TogHTrhKTa1t4TMHl6dtVZvb47IG2LOPEvza/YlLTgrU4HqXt7EHFMu5B2ij 29 | 1D/qelPcSRbRozjUkift7V8M+qiSbSDgfjOxSzcGiM9m6C0RgDLZWICGvsqvdxzqmhvJk1 30 | mYcF5MVkz10+dSB8qbk+YdbgtYdDehu/Lb9kDOf+rl2M1AbsFcmMMnvLZ80ISypuuttSCX 31 | uujAC11J523dr6RSB7M3iveHoZkOr6ZIQxyySVojTXY+0pCa4BjHBgjnyCcpDz72xh+ORP 32 | RVzPFSjS8WbRY/GiuzzYS6/zc+LKd3/rdANj8bemrRlKJzhoo5F7v5djpqgvuBelcicgOt 33 | WFYeTy+Ks7094HkShIsJhaKq/TT5/HpGz6LCYFb8U6UztkepSiHmd/l7RsOdn6lC9A4iCV 34 | GoWtvkKiOJoG1PzjeRPBaL6AZDdwoZoeoNq8+Z0GkiINss5TR2J3FGNXRgjqhf72mfeOsl 35 | wwCC4AUrxpx6SUdCdwE1vWdrAqafV0o9Odo5Oa4x/cCB+oDCDTNmWya2SVEmiDjhI7sChD 36 | 8lDCuWG+nBf4ZDO+2TfLCP3cNNU2shIa932nCFd/XUQIDuCScGjdfZHuf/YVm7lYeISrtT 37 | SmNUMbP1m/UqtAfLIphERLwiFbQDh7IfFFtS143gTxnJEEvUrReMBueVOIDpP+v7+IFgMQ 38 | KXtBg220gPe3T1FpXz7qXvs9nnw+9rV2c0g//8lJfRPfxDMLTwdJfYq2AR2aPQjSnHxz37 39 | 07r9jMH7ebf7ON6OFz29XJer+GpT1et6NGHnRopPyOje2iOyNc5lXBfVq2h7FW2bjAT7UO 40 | gMnI2W87+Vk26VUaP2xff9CTLg0AABeoWHeInFh3iJwAAAAMc3NoLW1sZHNhLTY1AAAHoC 41 | NgPff/Nc8+199uBOTnp/dMj7YcPj+PUiZNgrKiuswwMRKBxTMEnagE+4+Z0voy+2TLlwsE 42 | cctqWL3HSrnDtAmjhr2YcHAarHLbBEGgZqRF62kklNPlh80hGELC+UE+b2EGEyf3O5I1Hd 43 | hyP7JXBzt6LwmUVGGpNBM1Z8ZxTnydrs7dgubtUgWobXYvbN12EBcxZ6wm2yqu5MxPQovw 44 | 5sk7L03mPGziiBm9FTUNm38bXTPi5tncCecO3knFPIRxExWMKItJgRioW2Qpth9fNYhIGs 45 | /m/UwGNN9BXVQEmG1W/k1WarN0WJ8ttfx1Xlzaz/ISz745QT52pzhEa8dI5+XAn50YGrWQ 46 | EvM1/Y3otd1DGhV3MDzSnDnA5gcHVkHNscvK+Qyc1U2MUOjqAzcqEENknm212I9FBHcH0B 47 | 7D7+t+VPAfaLiLL+Z6snnhnTwr4u3idSE3AWG1AN5kqL6h0ARHgSf9DcaqQub9wFueclL8 48 | l6oyzQe4nchgJ0z3n+G5MLcmRZ7E0bfY/yJdLiSzamZ/LEAaYnCZ8ENjaubmai3KfHijiI 49 | BhX5ACJEt85r3KXlfFUKv949lbhmSBNau8aEw+Osh1EIHCohsuVY8f7e86zy2Jp4FypRsY 50 | wGeif4VUhh2C8eEu3T6p8QBgYznd2JpvDmNoXqllcIApOdgau0KUnZM7bcGxQakbj/zKN8 51 | 0Y6KLB4ZOKYfLhLliOzn/VoQAW7tMwEVhO1p8Zm1JcdmbCPbBj1skid+MOcpSO/GQihzKB 52 | EWCHsHzXCB9rzi7VIy5MFl2oO4HWf9EoOpDfT+XzWntI2Nto1dULId8jWTOD4OkTdWUaGn 53 | s7eyUQ7pkRoAAZaeve38BpE9djwt//l0a7YGCK+/CtWaCKW3h9SLh1e3KToagGcT6lH/tn 54 | rYkdTzZ3crT6iOZEgJplt63X5HQoRSrgH+C39l2bv91BIIYNw+F8CoP3/du4iUfZYbKRap 55 | HWLyFkB10lyx5wNJlbh4oAombjj+Ci+KnWYXANxaBQ3oP9gsd79RM8JHEJ6/LmaH/HbdX+ 56 | qQWN3HzsM5DkegieRLiAOuAKo/0TJqNP37wrRTDv/aVek3HLnhQYHf3NLAQFuzPEZjAw2b 57 | X5nbDVVLu5wroOvBc5qhd+JcpipSTzj8revo3LxQ7n8YEftzPScLv+2KN1oJYfhDYOa3Ne 58 | 7DI3pA3ZhzyG6UhMC7pg9CQfFE3DECZMD1inQTAvCtVKQvznuSjJdlMqmhK9QMMKwZXGeN 59 | abb8SZtslZMdWaxj1wWl4zrR4DidFz2DGG4kgYpiNWxKZ/KhdkVc7BXW6fqpPSivj48aeH 60 | m2GdqBxWjhzTS6WXhD+zEWEFU6BQao20+/IvbkNEN0C/wVbv6DyqSLVf/qYodWJ4GVKXjy 61 | I0tWxUka/j/PKMIaqnLFKeGEhlMwK1u9ypemqhRPsvvXYq04g8xKgFp3fUfYN1Xq9/e7Ks 62 | x6FzfMUyJM5+yd7Se3/gTFe2z83kH3G9p1T8FDReUWumTQ/9NvsUYknylx/TP3qKF0/poK 63 | dufmT/VsGBNj2xvt5NijJ96G9OFKV3TocqZuVjOGiGFk97MVH+iWyBOz18jIgNvUTRAcrm 64 | JssC6Sf6s4mNXRwn8m3ae8njVzOdPe/u92NRkQ/ksPxXWCArFA7zcYNQ3McRtsgt5qO7MZ 65 | rQrj63r7UnHjfT3dZcdJ0lFA+8R1fna88YNDs5Du7FDpzKBrCbrirQkzzfsSiFB7uU6IB0 66 | 64Sk2tbeEzB5enbVWb2+OyBtizjxL82v2JS04K1OB6l7exBxTLuQdoo9Q/6npT3EkW0aM4 67 | 1JIn7e1fDPqokm0g4H4zsUs3BojPZugtEYAy2ViAhr7Kr3cc6pobyZNZmHBeTFZM9dPnUg 68 | fKm5PmHW4LWHQ3obvy2/ZAzn/q5djNQG7BXJjDJ7y2fNCEsqbrrbUgl7rowAtdSedt3a+k 69 | UgezN4r3h6GZDq+mSEMcsklaI012PtKQmuAYxwYI58gnKQ8+9sYfjkT0VczxUo0vFm0WPx 70 | ors82Euv83Piynd/63QDY/G3pq0ZSic4aKORe7+XY6aoL7gXpXInIDrVhWHk8virO9PeB5 71 | EoSLCYWiqv00+fx6Rs+iwmBW/FOlM7ZHqUoh5nf5e0bDnZ+pQvQOIglRqFrb5CojiaBtT8 72 | 43kTwWi+gGQ3cKGaHqDavPmdBpIiDbLOU0didxRjV0YI6oX+9pn3jrJcMAguAFK8aceklH 73 | QncBNb1nawKmn1dKPTnaOTmuMf3AgfqAwg0zZlsmtklRJog44SO7AoQ/JQwrlhvpwX+GQz 74 | vtk3ywj93DTVNrISGvd9pwhXf11ECA7gknBo3X2R7n/2FZu5WHiEq7U0pjVDGz9Zv1KrQH 75 | yyKYRES8IhW0A4eyHxRbUteN4E8ZyRBL1K0XjAbnlTiA6T/r+/iBYDECl7QYNttID3t09R 76 | aV8+6l77PZ58Pva1dnNIP//JSX0T38QzC08HSX2KtgEdmj0I0px8c9+9O6/YzB+3m3+zje 77 | jhc9vVyXq/hqU9XrejRh50aKT8jo3tojsjXOZVwX1atoexVtm4wE+1DoDJyNlvO/lZNulV 78 | Gj9sX3/Qky4NAAAPwCNgPff/Nc8+199uBOTnp/dMj7YcPj+PUiZNgrKiuswwfsZrKREprv 79 | T22NnLZPxAXZFwfs1nXNrLAtfl9hYVVIHnTnbq+pFyTup1DzGMmHuDkArFjn08UT0WGD/4 80 | FmVOXUdOFMG8OXJ/1THqFYbqTyxJTTqCaoFU4ubIYz3aYWMhYwBmE1Rnh0E0EVcoNySFUm 81 | aEY0gHUwIGMmVYCIWIIzY1EgVQJGhIIAN0ZDYhJVJSQ1AXJTcnMmMlcIM4ZSAWgzAxIkUQ 82 | IEJgIlFwFxNgZHcmNiIieAYmYmEkJGNBYwdRciZmQwR4Y4FSOBNEFUaHBIcCZlUggEFgOC 83 | JTNSQzKHIkhGYCIxJXcyNxg4GERnIESHVoBIY3JogRMxR1JiQSN0BXBjVVIFRABANCCGdG 84 | VFQ4cnA3UGKIRgQjAYR4E2BSN1AFdyMFKGAURBVQVmFXVRMBFnATgYdmN0h1YVWEgwUhAF 85 | UCB4aCiEKAEwUoERQ1EhJ2iIQEFnhSVWUoIxRINFNmeGZYAhFUMIRHgEYhUIMCR4FRdhdk 86 | MEWBV2ZEEYZGBoNmZYEygUgTc2g0VxgIcWRDEzNyFmRHZDRSODIVghV4ghdEQiJBiFhRM0 87 | U3GFFkI4ASFidHdGCDNBd2KCOHARMzSIUlNAFUFHhDEmVIJxISQQZYKGYIVRAkVjJkiIIX 88 | JmJWaDhXExBHNxERiBgkJHJxJ3OHBIAgcCaHFVYlQBdgMyWFQHg2F0gHVFUXJyB2cjQ0Aw 89 | RAACYGZ2MRUGhEZCOGiIhzEgAhYgNVJYU0RyQ1VxAhZ4iCJScFYoVkZoZlIAFIhYd4iIgC 90 | IWGAIDeCEUMjIwaIdzgyYkZScCZVMXczhwZYAmNoEggTVRFyIYhVAhBnQ1gIMDJhJHCAdy 91 | JUAWQjUSRjYCUmAnZ4ARYhVXEhUVNyZIhThgdnFBdYZDEXUEFWRiYTFTgBNDJnEnhnVzRU 92 | gHQlOIYlYRZzd1dkUXEGVgc0NEB4FTMDN1JWRXAUJTEIImIYA4GEhBGGRCQoVQAlaEIIhg 93 | FjZYhCEIJjhHQHEXaEhnR0gQJ1YAVkaGFIBQOEWIZoNGQkFoJRN2IGYCUDiHARaFMCCAdH 94 | OBNUYGODgmhVI1cFMYdkIBF4YYYSdVIldgZUVFBzVAcmZDIlFzJhFBYGJzM1N4QXFHJBNG 95 | GGQwNmNWZVM0ZFMnNWZnFSAmMEUgFTUCM0BxNwBIFWVSEzNgNAVIRnEBgChIZDCIQHQ2Zg 96 | dBhUITUAFEOEYmdjBzACUIUAUQd3YxN2RYcWQRIQcAR0iCd2VjR2N4JnOFEQRwZ4ABQwMA 97 | JARndwYQJSUjEUAlEjBxiFQEAwYwKDQCKCaCA0JgVwEDUTWBNYdhJzgSQkgFUkQ2EFZGhA 98 | RxB3g4UzJ2ZnhwWFMRWCcTcwY1aDFQU0FSaCdWNGAHMTEkJVUYcXdDdGRzcXWGAIBkCHRD 99 | AliBMIdCIghkQXhxQUhkFoA2UxFnBoMWgggVd1IzN4BUEwUGNRh0RQVAZ3EQSCBmRRgCRX 100 | ZGZlKAAgFTMoiIZDCFY1NhFgN3hkFYYVRCQBIgBBhjVmiAIGgUAEQkMoMRVyg1JCY3A0hy 101 | EGJWFyJXiCdXFIZQFzdgeHZgg1CEVwYBUjF4ZWBwRzRQd3RFJ0RWESEBIDBWNCAzB0A1I3 102 | R1JwdzEnFjAzchI1YAVWhEB4ZYUVCBCAdlAihjEjQ2gwRSaDdTMhBnNERSgYBCNSEFcDeE 103 | MTQCRQOCd3gVcmEoZxZgJwhXQUUIRUNXg3SGh4AwACM0FlIEYUJAQoQQA4IzFTiFRGV3VX 104 | QgZkUzUhRwIEZmIVNiEYZ3clNWElEnY3EzIEFnRQRAJSZEKFVXYUYDhUVIE1RAM3VShBdC 105 | I4QFRwVROFBSQXUwN3VSVIZHElBQYjQnhTYQAFVQB1gjURIzBoARgjInYHQmIVcoFzNRYC 106 | ICEXEjRDF3RTZlSARoFVViJkgxNFYwiDciMTZlM2d0V0Y2dSZCUnUVNBQmEgEBJjWEJEGF 107 | g2MldYFQNzVSdRMTBIEwZjWBVhgSMAEIAgF6MUa2fhnua2ieTQU9fxAe1MkFJ8vVri4dPE 108 | SzELTDW1cztF2HXS7Swdwp0X0KoIzp2dw2DoJOqeZJaEayKZCva28m4Phi1nwty+Yzh80Z 109 | yk7DhQheOWkcZ5E9jikC8flmXB5hqAd80M7+1w/j95UpgasPJ52tt9kwtblSnHuPmOZxw0 110 | PA2AtzqSCdbg3mvfGVlIsOTKC/pR5goZ/ddYpeOS3EX+1qFxFEyB3P6YkIBnF/SpcJJ7Ab 111 | oCuBlLWt1gnLZeY7mPBZDtYXvv95ftFsrt4OBx5iiP12WyT1I8Ga/UkqcmsvwPnX8wVSA5 112 | CHwGthzx/Fd0Qp5QfaqZNh8ra2BgYa+HM73AZC0Zjo82HdR+RT02+51wTPcrh2tN0rTmbx 113 | ZX3VT45qKP9eSws7GcjrVpmmVeufCvrVfPVwUrCGUVjwTaIJr7gwaZNEjZisrXIw+dbJua 114 | BvrjXmrrJaXju9ASzCD5qRBXcpRFX3h4BEr3rw2fVnft7aZVMK0gcrMS7lA4dPbE/xmX0n 115 | 7+s6OOVv26aN3UHBa+Ck9GQk3jygGgznXuVqRWYwMy/uzsa3uKrGFQmRRdivuNmdM2UzdZ 116 | hCba2qHLcaEbV8HvgC2BVJpJJmmNlbvH+xndRDG9DWzL3AmMAZqPqcJA5O13bStwpGUvsR 117 | MAYDuZsZB3HEgpZgQ0ctXgocG4+Z7NQjMKB5r3OzT//zmY/VlPU0R6LSSNYvYSv/yHoqYi 118 | gj+HZhY+aXWXIEFuqyf9jG/od4oTz9edLJ6atA/CJB2VPdj1j60ZGHDb9bBqTzhBX/dpic 119 | aq3ruzIokesb7Jvsyn3sWiq4g6ErasO9Gv2FtmD7BWd0g6AxXuOweElxmfQpsQEtkiv6TH 120 | sxkYX5ku16d8ESKOeEg4vqi68gUfbLJj613XvKNwAubFMGSXxy+O7ju34EG54JiYxjHw5B 121 | tDzHyO63x1MAtbiE9XdA2PTDfoe5isYoccrD2pJCuZiI2U6D/pW7/gNi5Qxw7eOoZ9GzZM 122 | 4j+vOzlWBhJdRPd6pPx/ndcksmz98WIl2P00vBrpuj5JlUtQLZCNp2Uy/mGbWZKf9O+kM9 123 | qxVulAq8gdQjhxVQIWYi6hHUQg99Y2Z7N0f1UBrSSgjJU3dCQ0vMfL/6rtH2du5uqUfENk 124 | Rcg8m+bdrdBBt5BGGMSlxgGv0vqCw1YT//mTrTeF99CqDcEkoQskdZyPac/rHuJl4Hiqjl 125 | KTY0AftsXI4q0+rtVj6fGyyr4DGazaDcfApL4vTnN5VyrEjRbf34NZ7AICEU7cWXkFnnML 126 | zPC+BRDnfQl+s3OAqrwHYpZXqrW5pdhAshDZWgRFWydL4BKyjZgYNTi+Qajt5uJ3jVMSCw 127 | xqTxKS4JQlYat/nmEq5IR7/nDIv2/Q1qcYEa1ANbAr5DjBeMRZ06LM6auIVhh57KCNeltA 128 | vRbJGbIQl3iLnBMyXcQiTyZpy32+4cJYXyxT93LcuN/r0U62Hyv+EGlg/wKSTvPsTas6vs 129 | 8SRyGl24NLE04gsqjh6Y0UCaEVnxMu63ICZrJzkw1sWh4QpUMYHbhH5Mi0nJlsW80uG6D2 130 | 6i9LV1i6KAefRrX3I9xqkacawnH69nKrh/DiDepd0yws8SpExJeddoMeweZyN8DVkB7CNz 131 | nsWqfmFoMRDvRKzYKSo1kfadXvuHWJGDTNrGZtugLaRxFzzK67efbn4/yUR9pGk2svbyAb 132 | fNQBU7ilK7RZJDLTWE6ESflF5s/oPQhMfKaGbw0g7iKg4MIWXHrmGc6GxmRZ0F6+x5EI7E 133 | AZ19TkJBlaDHVju4uB6UhRLvlVf7Y1kVVxWMa8MZ+i3LSbFvSn7EQ1/hNhOBG3Om5d7FQZ 134 | lnU/sCObr14oSVkPVsTeA96mED2OmEqOUWRxWRnxSgrSgS5oWm+djPKLO1IPJfnF4XSW3P 135 | P5U+pykXw+MtVJAV14kic4kBqcOEqP3zFisvby6eeOg9sCPltBoTybYqEngaPBRksbKjS2 136 | psCDNcDhVRE+zayw5dvqkn6//+pn5AE4DOsUVUAwHJNq8cqko2LISmlqON/NcbFIPusT6Q 137 | Gt2Ywm9IRNOknZtTH7DKR0e8FJa0/VS38sSonYVFRoUyWF57dmGXjaq9lrQwJjnAFH9LEp 138 | dewxHRKECtJjPYHaZo1vghEnIXQfykmxedpLt15nsyaG65IQ692FRS6oNV+LubDaA0D3vX 139 | O9NjUpyp7lRMspMrtmHTy7OBNpga6G+xOq/k5PZKSzIlYghFpxKlb4TgEE/I4heHRcqetv 140 | kROBdldY3FAO++zHwZCD8keXJ32CMUEx+ia74xJnoseHJ18GRuIyRFZn4mgSyhZga0gG7Q 141 | 9N8fmekEvX8opjwLbt5wok8TYlBNJyfCOhfFSBoDUiQcORIqymnxTkj69IoKphjyHYN3G2 142 | b1i93tb0g1HWGGWlTZax9s9pvDaJ+3dtIrmyRZeY66C/x0WlCsUExm3dgv4t8HUPWDYbU8 143 | mz4gAmC1zyKJVB3bqlkBjMHdNRhXiRSQcEfuCmyaWlSgTN9esJdXTUl4mnWSFCFA2HDSCF 144 | NFbXvDsplqOIfqS9+4hnc0zqTUuXStFw8EvShPBpE065/Yu6yqWbgOdFzWO0KQ+ILvOMGC 145 | qo01b8omKGVOBheiqTVtKWQOQsqwQrO2GK/lsQfScijxP+VH1Jy1NnKkvORM1gSV4ddB3U 146 | /lL0k4Iv5NWGVefsS2zZA44fwkIoPTChcfAOHNu0nUwHMB5+5YfVu8+dXZLk0/dSlDW6w8 147 | LLPOLJdpQtAHf8/ltc1sMdIf5GPhB3GX81Nzbiv9JWsQRM+oxMTNhroaphnrpoXRuML3db 148 | Itj2iJoFPMVZzbsfqKA+MkZ1/9jHE6h0332BuotzMTFK/yn3RKc99TCO5rY2C0ZyapONBE 149 | jGmkUF4yq4O5eHIzrL3gM5LfS0Q9BBciidndQtOQh9RKZlEUH28d/x1Tc3zyVSThtXUOSH 150 | a7+mhMF1ROQy9t8sGhEZki+CSyjkc2htcjn6elHkVXZ8TX7Xk6r/8LL1KM6cWZ89SauesR 151 | D+foDuSInMb57Y362dWEbYYh94ZjJMh4SseblRas2lnq71jbO7EBxZZZacpJX26qQFO3h+ 152 | 8YeoEcfhp4GU9w4cFRLKuUcwW3qFQT99J97zqChwH30VCMrGkb9Nu/FrYEt0y6eRlur5vX 153 | jsXiFNwNLPuv1sNYg1sOhm31agNHHxUcMaYAqJuS0XhxTG6r6DzIqElGfoSbsbXsbyqPuo 154 | 5DI0inH5yjl6MSWd2giQs8mH268oj/2EGX1+ew87qFsPNebFyzyI2jzyUW80NqxjRx2CkS 155 | MpnQAAAB5zaGVyb3ZASXZhbnMtTWFjQm9vay1Qcm8ubG9jYWwBAgMEBQY= 156 | -----END OPENSSH PRIVATE KEY----- 157 | -------------------------------------------------------------------------------- /keys/id_mldsa65_aes128-ctr: -------------------------------------------------------------------------------- 1 | -----BEGIN OPENSSH PRIVATE KEY----- 2 | b3BlbnNzaC1rZXktdjEAAAAACmFlczEyOC1jdHIAAAAGYmNyeXB0AAAAGAAAABAPdT66YD 3 | RQNHAFLl+piVtpAAAAGAAAAAEAAAe0AAAADHNzaC1tbGRzYS02NQAAB6Cur/3rZW1D0zxh 4 | OJozggeqVapt8rl9I18t9DZt0jQbYHgGoK2MxX9iaVlI+QXOsmMK5B3qaZy5BjUOn/rY7O 5 | fmYS/90H+rqoZktmyQ/Xu2Z5DKjblSMTOM809BY0kQ3yxAjIMcSQgMeHfZUqErt1ZoXvU5 6 | QtLuvXfb1ObGfH41y4INoloaeUhC1KiV0zFD/Unev4IfWkhV1XAtSlQ4vHNkq5OGD8xEvq 7 | lG9HXDJJfoNiLbkmIDNxEdxl4XxZgFWPZhgche75rdxrA2IhHdY7d+rDaOsitQwRLWaHbd 8 | ElgIQ/FApy9iqoYYHUu/GFfdrGi3YWVcONBS70VBtO5MgvSH7fiP8wEhidMMNY2pjGrvFB 9 | fQG0XDtxkVcmvOeJmAYa4gy5WXaAdzw5WhOPALYakOD6vb5wND0+mQ6SckLfwHeeBAww0k 10 | LB3n8SQs6LqVlc5c5MAoVzvATFGG8Qj5nyQgAZJBfCD6PNEyp0fJjXOlA5wlfJdXCN5qmm 11 | 5tUVCwHBayyUsDjz/wWxnPXTuRCNmNdlICODmedPrR2MQA3jOFqctRKc1ynyxGG2DOHKFU 12 | UGUb0FUvZfASYSNM22UrT1E6En21rskT4TqkLyC6S8iRQSiPB0pM47IjpY7Gt6shTo4Fg7 13 | 3tx2W8ZKHVhQRlGyoZWdt74/jLtdVOlV6ZRKIBlzEp2vNpN9WrcU45XvWO7LF27sZWzk0B 14 | GsHiheQg4dbprK1r5By2hS+Xl7RN8P8eUmUeK0glGI8jigtDreZ5STSs/Oy8C3rIxpV6Q0 15 | JqSLpGr5h4N82zu4tGwb7M7nulHA1aVCVNKAp5ysQBOCut3bCUJiRbz8MRVgn53gSVg3ET 16 | RsSUL0S8PqjjhKTPxLMg944BC+mHwCuxQ7nX55+b+q95LCmOZj+peUBHzIPilf5ovE6C7S 17 | 6SvzLEk2IqqfpnnsXIyk6BI7qTxakOHG5mQV+3T8MU+8LjiN63vB0E1Q+O7ICyuI8VUa8c 18 | hPQaO5UigyV5qx5vW4YT9h8nEo/8fvV8qc1qxat3xgkYZrr39tbjkq2nTFmvs6aMPAUC2r 19 | v4TamfBYaYkwp9ZtyEuq8WVrT9zE4IfJZH+IYiarBfwahwcEExRucpJe65E24T9FR/3ugK 20 | u03K8zyhkLQjvDoVuuCazmnlwQndqp9kBSIvnwtYk7GSow7/CuvJ2rRs2PjYUyfuJnBBT2 21 | MEw+snpu3RWGEmEbWoL/cuOBK2WELjQSBD9995jzddPMlqwApXLA08J6xpF4LmrwjHvr6+ 22 | OHf+FSjrLSwcJHxhJKEtTIhdMV6IJi3tLvBtOdcRNHdaplWI6sYBlhk/CL65yoxsHHRZN/ 23 | G3nGnCpt3eeGLe7R+5COxVFYzVpJE1owdIw/r9QEQclv+DmpLfsKHrDtYC1bcPjyZd877f 24 | wFy2X/naGled3CbsCfX9YqR+RSkLtKFHKRoi+YB2sFhe/Rc6v4fCnOgHZgSch8w4q7B0yl 25 | gt27fbauHtVL/DZNloJRKbFQyYX4fJ/LaNVKNUB4UBXxUMO/mSWToI9CtQza51VDebvLXA 26 | Dj1HgKhp99Xqo8GvWHvDFLhyyZPn8AT0YiPEluizjgXH3TqkgweEj48dYz6wQwALOt/ITY 27 | bKGoZBhVld3PBNzlymc2VLM2rVnLYtW+x/RyordwYryLCE5mf7F0CONoMPOEn960G/npui 28 | J4svHpK151x1rbofQfalvXASiQTOWUd1kXOrsSLB5isjvGdR9dIRyXtll6K/IRHwEqL3d6 29 | M8vxeoqxEMyrMm3mPJTJjrSKX/AeGoK2HkfL1DO1C18+mNflFUUibu5YBty5/a7/I38z1v 30 | 5LlfsvhCjsXelNIX6BlBKIIVIICgyssOxW+7yFqdjRC+GlaqvbUOgv0mEaGsUi5WB77JSd 31 | uZ/ACuiFX1FwYQE84JOKgmkTzGJAcdedTOugH4MSYEQCBf7KZyxBiuTds8qY09Ik7K168z 32 | dmbiM8cQ+UCfCmUzcvv5bHXINgirgRMimF0TwufqbyaUtsK79qhBOobXZJb+THaS9K4mjs 33 | FfvIIuRNF71cAMT7/Ig6ps0BVrHhV1XVxR9cHK1LD6q34nedQGTuz1MJsvmEHN87MYh1ey 34 | xYtRHRpqA17LiUHUCBnGDgETRFEd3E+7sWK37RMNI+OyFmF7TyL7DUi6O1PjAV8u76yPJ/ 35 | 5pvXeHgEXsdqIASmNbza0wEvXpONtrmGSiEzDP/7zBdbWmolyK/KHqP5shlK5PSPZzP6h1 36 | UKEreCyPDsM0N8IwoW0JsFXwp6wRCfHyw2aNAZh+pUnRxAX86m0RReD6ru/BdpmHIIuLl5 37 | JVUQutJy7UzjABADEQ5bT8trtl+CiuS+6OQcMiRbVVNyidwPbruhZAAj9e7BbkrplhnHyd 38 | Bsaf676y7e3QTjpn7OWg0WFOMEFcICm1rfTy8ugRnBL2KScSlC+WXy2Fc5VkzFEy8xrrn2 39 | hFpxCNAJxb8A5CWKGZ2soCerGieffz1F+qc8oFkvzqEgooHO0+Tzc1rRU0AlsNCzPPs1zG 40 | ZbrbnwB2UlOv20BK1QacDXCjhYogcHXf16cqtu0JuBrsIqvVu43mELLwHqTdVnjzsKkGCw 41 | AAF7CA4n6mo+BcvUW6fsiQEmMy0lW4wuf45fXfG+8N3R54lMd9RO8tLaXGtV9YkO1CzvtN 42 | vlcce0qR8OnbYr/gA7LJvvLQl/ejohQnfmQKgoqaKhfPZnaRyYrrboPwt0d67huX31E3TE 43 | 1KXYyhql+ss3p/7RQAGmiJUbYMosLXI3WsQjpvUk9320U1MQl6oUGxE9EsA34mGpdOo+JO 44 | /UojPEeWVuVjZKzHcU0U96nY6vWa4c7RFpiiSjBNAoBJicBf0KOOKAM5yuM8kV2qn5pFk3 45 | x0X8IuyGqB6VXIu2AA+0bocPmynjtzssSFChXhoYBAMhVjSJimi7v35svNXQshEVWcKjDt 46 | 4YHv9ZmoGGdeLRAA0DPrnSCkH951AUMqhGIhHM3t98YMr3Wf7e83h6xVunF33sMK4AX6kM 47 | CxHXfGp4WyUsECRp9aeMNzhdzBORdcLR5yY8/j7MYvoOXxptTPN1L1k2GBkwUCM1VjBQ9/ 48 | W2jnT/or8Z7yEn7zgGfffAk8ITwSZpzeCwKyWsH+HnUSeikjqNTj3vbdhmRiyi0O8K31E9 49 | lFrGMWm/H41J6FHMqrdcs97dgrW3RVRf60ogICa6FcOYYsHgmOlLeTW0Up/vbU/GdiNS/m 50 | c1vvidjRjbx7R/U8CI4tjdD9cjn6Uau9QZ2LkrN2J8g/3BQHnHn0Cx7QtBK0zo8yNNOa6D 51 | c4T615r3o08vhlty3DIVq+YBFtFmWxYKTjjUKs5sCpUr631MFICbjVmUzGLt6GtuW0NxaY 52 | hbsaerSF7n29wss0+UApQSkD+pwZAP7eMrTYlYAJYwAdGqs5c+lY7WrTtfYvk0LcPHGyGh 53 | 4E4LkBXqTMD/v2KP0CeGwANCBSRRLyGshsInIZ/hVUu/AR/Vwj45ds8EBrSm4eQmxcZfHT 54 | E0BsG1usKCLJ0sjuaEhrrHxteqxfeg0CLYmyAR29ASxRKjM60hklC6giJUiCuiiZ1FUZ+e 55 | f/MFOg8zcksBQAjEThFpe1YZgclvJR7RA0/WRMPCte7nZpsgwAanqmwZq6zVngL/x1Gwde 56 | 6GjmpDC33CZ12OIXdqjnZTpLYanHF2fPb0CvHuicXm580vvOoxRo0xnetcP3Z6P+cDDO3e 57 | 74l5kRIswLSKU7VDvaiCyqkdqQfdhSowZSPbdfyr6XfBdFZXIII2AOWHnU412Sfhs1PZjl 58 | hq/ZKhuJNfdUK0gBgC4YT6kUBEdUp9kvHgLpyKlDKi/9o9Lu9X9af89lpZjrH3vuejupY6 59 | A+GoKlupDX4hrGUowWMaOtfvkM75ZTUDhei8JXoID/CJVCYI8k1aLxuQcD9aCwD0auuFZL 60 | gih5L8ZtoGt7Ajj7wQxHPLDxVkyfh3w+3HHAv8mPwsnD9Y4v16r4qEhfOiMO2ICbmGj9VQ 61 | 4ykfHeUAPPKnAzwnn4YTgC6DVe/UM8mYVPHsFoNNbqkGcg9DT3OrpwwcCIzQP8oEFw/lIe 62 | kDmyB1AcLebgfwoda5eaQRT9zGxe17rbW1IgFwmJQR2/54lh/Hl0O+OWfUMNd95SuytJ+H 63 | KQuJnTM1wvMKzAjIsr2GNh1OoMzQkQO6P/GU9t/9miv14iJKrrTXlf9U67kfEWmNVFG805 64 | uSJPKqtDT6P5PWSfYxL2K1BDFG6zcvfR+38HulfVJauYO8l6l3L7YNC7afv3OpRtVynAP+ 65 | s4QcoaJTbDfe9wt34bXfvFHs5Ue7hbC0DB4bkDTmxnR3RWXxWsHUDwoMGesV2r0uXSfMW2 66 | 9ARQAi5GVvaOIOshEhPG1EAaA5ZDgq/fLGbY+JAaMMNwS3lm2aWstUuwhYfbLvN9fpLHao 67 | uNIcFyEgNlH7PAU6cRkZajzyWJEtwb5NQ73TjLG+xcGZMorxeCN7/VBSuonBTRRIPR2Xh4 68 | aZPWBpGd84Kek6hTq4E7JJkFvz7klS3qQ0bvjbNU4DLTjMjjIRYK8tn8OetBzjyZAPEdjm 69 | +3bmRHWl7HHzLIB9KIL9Zuv5TpQV56Du+9+TGTtzjnA1kfFR1r0MNuSmrGeiHiLzeVQPvV 70 | yQ4g6jkA2u/IqbLhyflPfVVP7sfYbNKHyV4yZgBSq9K/UsfSKt4gliaU2obFewyiDVpD9M 71 | xwKjlmux6qVjBzVv4CSmSTe/Ppk5lqZfahNKri3CufQCCgGE6AkpfdCKNoPBfxwlWw0X9E 72 | kSjZGmAIkaTOK2B1EHJ435MiQ+iWzhDPpuZPrws+cYGJmpEQfP6a4ZKZyHZCPr5+nl+vlv 73 | yDOV3Z3X0tu/Aj8r4YcKcr4zUFda2nOONkYTpq522f9kkGdnokIFttYwLgGJA2N9czyodZ 74 | ENkBBYQPC10PPXLYGHxzYek2/kgTc+YjBB3NG13txqstl/WyrU4mNUNG2UAWOo7TmnvVhS 75 | Ig7/2Gix9zOLwclS0+jplfFfTpPH17BiQICS9QwbXNKkPc1b2xPRhYNXTlY3t6FWAxut9K 76 | fV+WGCzpkRCNjqJAD3cG2bCCHc0toStI3juQw0b0A/KQoDCieihPpaCWVFTB5F9R8jKVF6 77 | KD0ALQ8rv/Hqs8n3Jk/H+dKMZpXtUSRFjFzjXVebQGoqTUnKqfd3CTyDWLowDtlarvOo52 78 | 2f5niHAI8EsT5r3KiOcjmat0tPsDkiBD/qUBQ5cA0baJmuiqcmb2at4aR9nWivcN2d5oZC 79 | whNQg42pPy8tHy35GGDl0xm+EJdr3TQpKFa9LxVFaz6ES+PaeA0U8BAmF7sQ2YBqKj9IaK 80 | 3LyE6T0R9MIvgj9G9NxLY/2J3xDyHAsDZE3mQ1yDHoROHhjQquMXvw4UTEpzXSp0yvdAjR 81 | P2OozlDrFKJXF54Yim+qTcwnaLQzlBzaVT+Z0cb3sapuGCuXJXUGZc8ZBd4AA/hmAd/edx 82 | iIH7I2O/65ibRBh6ueIkB3r+/LSaJvIGAgOacqtmTddazRgrBFcIERYeAAbvrSp9drAEq0 83 | AS3YbVmeKRgDPmwmvfGirGRbW/AyICKMWxqfsRL5QD375O6xpe3b2SE024AjJP4XAfx7Jr 84 | rO1F6kJlmtw18mJaBDREh56eQ8jbIYGXEbaS85o9LenbjjMO552L0jPKQBQ/9SQnnrk0Yx 85 | KmZNZCtbhX6VnIsraiGzhn/HnwqtrWsaGIHhVJoqB8UxJ9TYaRTzOYM4jffRuTe0g1IZWF 86 | 0XAZ/CNqw/qHyaRAP3FU37b9irBFrzCGHmhvNzcV/EEXtGcqDk2soP8W47XRHbAaxFrOp8 87 | LdRZcPb2EXH66eyW7SE0zFIyMW99PMuxVwG9UUe/sJGdjPnlSq9SWJZpV41e+OKpqjiArJ 88 | zm3dsQPQgQMt0MeFg/84mL/yCzGYmOapvVyMPfSRh9gPcI2A+rGaeaREperpyoZRtQLb3w 89 | NlYkYdtOVMQL4fPiG6mtewtwRRRYB+SF2llQYtNTP9SRtDbViPdpXeTyc6+MbOQAvpSpyw 90 | KRz8KE8BOU8I8z1IKa9sUHq9twBsh73rdXCS8D/Nbx4ECYSTPmAmev0+KRu+2t7TfVXSZ7 91 | 03LapBlSYIefgYg3s2AAQI3CEpGHyCGcBgPmInbJN4F4lvOkLmPNkcFMGhHxVJZNtGYPXn 92 | ISIFwcTDjODvao2KRUcw1CswpQZWqrY3UHTpQT3362MSzdG2FH4mUkX7sgKHp7KRjQcJQe 93 | ksKkc8l0WYHUNH51zW9t5jg/jLURRCPzx5iCg1UhdeE03xgDiW2TlkoD6KRRl+uaoZf3UP 94 | 64YPZMGeBII656FRMB947Go/1g1wMC33G+PQkQYsoe+ABi7edmh7Gr7BtojCq+Gw6KHBA3 95 | va4F+iBY55pYtFJqwR8HUtK/vwbGhB5iSkVDGHjF5zxbg3C+PpB6wSjHNNcTcYNa4mNRzO 96 | ktMaX5MozqOMN0Wq4Cym562EkcHOstpZMVzZu4V1UZUPcVZemq4F+NIUsObOKCiJBCbijY 97 | /X1foydwPYGwHDcKwj/hcEmJWeNGHyF5R2IJw6CEETcaUGZO3rpcoP4HKIN0r+hRy+AzO/ 98 | kCrDVufXeMrzM3hfDCRk2okoIc+SUOL01JVitUsXnEA0C4tc/snP0bbGYrgx0m8OA15eJN 99 | uiIlNbc10myZ1xEiaFrVFakwHaxPJMbo5AxQ/lnN4r7tWgFQ3WUFu18lPshB6q1p7qY9GX 100 | J9aq3X0ejd5iuJYDo/L7CJgjyQ3NPVtVaHvH56AujzNtxoE1F6CBcyh2ywNfk+gfsjNxG/ 101 | CIJEVsPrFdLy2GurjLHRCgI5fbHp+ni2onjWHcUEBR8BkwSZeIqChblgdiR/mPcDmGgZNu 102 | t18zQSzrvEjTr5wHg5bQxSyfzP/Z7B87s+zw4SVCct9xet0DrNXWIo9wjnPGUuzjgxFfIK 103 | 12wfz89F0Tu03ILLycvtK4whhKymlCTV+Li0qpJ0psEZ43VKuqRqUfkoFdTUZaMeTw6Eg3 104 | Pchwd8Y+teqmsBvhja43p+AhRDC/tQUAZknuGHd48474etzwle83wZ3q69zUuiKV3G6Djo 105 | QwdgMrnU7644CIvHR8Tms6ez01cyeXucClvENerRJbJMx/slofY+xqbDNXm1wI4C6uZ3YN 106 | YdD2AD330ZwHrxyxlWgk5k85T22dTzBS5hXx9NcGcPqs3xw4WtQdMqupuvQBUBoDN9Yaap 107 | 7qtNiabn524jeoz+PwmQp45vScYLl1jexCbMsM6e9gubi3fnmcnkatHcb5GVZDQYzn5xHL 108 | o+mu9oitU24oSrcRCjFs0Xi8iMw5VAtWlkRO61YD9WRsin6eNc7sVcQZ7yL84J5mMLRxlg 109 | avTOSQUwx0/XBeYSy/QwPS76O4X8cTg7fhNH4qJPZQ0b2qBdEKA5TsuzXDlaqVM2QNHUVN 110 | 59zf4aVHfIe0b3+Xcds8aP4b++9J44383AjoTam7VHaUY3FBT0Q35yMCvbtcZP4WWqnf3t 111 | CJfkJC6RqUf96PPHffUbTH3Q5FOCWFPQptEbG7eRbzV4wsr2iiZa9AKJTfStm7UJieQjH3 112 | zBEQTl19IfRO6lhbdG9NnY5kB4gMkoFCtTDI341jiVLOTG8GGxnIr2Bistw5nxY9zz7nb1 113 | 9/btxJ10PWeiXdJIwK/vJuIoXjxpb8qiPbwInDps8W4im2VXrvwgSkXrpvLmThfNy/pELY 114 | X/72YOxzUiupIgAbJuRPYMTmaINza3mgVCbxe60Sr3UVcJaERS3WI2dlDptvK9mSxve6yw 115 | sw6Cogew/+zeaV1qv21VFg8/gvFAvhBDcohluNiezksuAAfH3KIVeB1l6fOSA87A2rnf40 116 | X477jbAx9LMYAqYliWt0gE7vKX0sfW1XM77WIlwjQ5XkT+25NB2jeHsNNxEX6V9zVjOCiG 117 | azGFqe76IUQB+X6LET8/6xfQ4Uc1rgsYFfPUX5kak99ySYhg6tLo0WR4n5/EPnYmqHldpt 118 | sIKJw1FlOK545qw2U70PLNm61JCWp02yGyfvw6JUb0YCYPkWw23bZEvTv2k+AB5NqUXlp3 119 | ZrybTMy1o1+jVrrB/Y7ajzbrDndNpcHGluPuRdspsbG2e4Rb2bi+4WhFlJhBwL4G5GSSz1 120 | 0YrIqXz+jrCGZEJ9+Ivk2b+0/6C5dDltxt3uvi7tIkKAcdIEzLF3u+JI4gCE83GuY137d/ 121 | HCzSgswe2NGdG+vxJG5CAhUbu33u++yEzThkHUWofkKJGoeKgqc1RYSo67wqZTr1kPQueO 122 | m9AmrNjrXmFqRb2JX35eVI8NSQRkr+wUJpZySKQ5Zbavnri5xlQOpwq92hPYr2lfkuHCgG 123 | BeAkB3/gP31xeIuxbzD3xG+LTa21lDh7Hjs0+cmbZXsa+QbNSfrqi0Mld6DaMhYVn97hlA 124 | KoBqwdKNIuF6f+YhkAohScL+PbonGaKQ4LGlllvdF0cjwNM6Py+7nugFCN2THbvplQIFYn 125 | Bxirv4WAUgPXJ12TvFx75sZZwh5nSFrEKdqeFvJkqm1y9LgIjq1kLQXuVaTQWKfCszTP2e 126 | WfAjlDbbzywv92PwDO0lQ15MOKoq4AuQcQ6INdWlkBv1JG3qJnSm3lmm/Ef5bvAjJguKYh 127 | 35w3c1xpPHyQsfIOrjGCVd8tBHlgQW3KBRKMsH9GIdwNVBWX46vRzIcVxNXE/HDEHFE0vY 128 | ZPXIHh9hZHxktVK4F+SQqTJGPoomSgr3BpGyiqAgTfKl3DosWfSoADwB8OUZcM9lgb7IQO 129 | LjmXJYeSS4j0E9HisJOfxTYb3KtbECZaIkEsfmFN454GRH+4jbwh5Yu8RQxUMa1+cV1mLn 130 | fNxcy4q8Ke4+iPH1Y1nCyPcjPewFQRe+Cu8wlwHH/VyvRZSZW8izjY4F6NYURzfVKs2H3v 131 | ieqHVtM2ifpuoYRWFGx6K7jJj2Gwj89rN876T9Aix0liGeqa0R44uaHq8SaPNjVoURR9wc 132 | /g5ucvckFRuui8/pomV7BJQw2UrRGsVRnM1/8LFMkOnpqHLd8gC1N5t4rGyxLYqh/RE3pA 133 | uV95Y6KtwyTex9coKsDwVjObop2WH6e8bLTsr3gPTs0EwEK/O17IwSqVV90U1ndmFpBTtl 134 | 4oxlO6obcv2XMjycjZQLGroHXwRlRr4mD3gXNgr6dM5LL51KWYuHX1sKL5+Jd2N59JuIOq 135 | yX181T9U60B5t93ApK7T90TYDqwdRkbhyQ0TEcgCe1HDbGTQE+GDbf9PU7r2QP2ouRMkjK 136 | CTdbef5VmsgYFV/GiHpS5+hg+GKIyGGpIhENKRhhaL+RA0hxJH3z4AUr3ezUIQHoWYWDkR 137 | VFIAYoXu6b2Ta+Jbps9RtPzmajVPaSQAw/Jhv5RG5I/xwrlNnufGmxD0fzqp/X+SbhVOUQ 138 | qpX0Q8fkADTdBSztSRG+PJiaI/IvyQ4QwJA6038HcAkcBYSyr2xh9t6S9EcGnlGp/G0POc 139 | B8/88wlOH1MHprpfUo0VGoZ7yuVMP+OuHr9gtPKwbFcDLhz2Q2W1z1pzfiK/SgERHLH/YT 140 | SQL4b2ORySiBnyLhgMSwyqNGSblnEJ29u1yoW+DjijBjFy4slZRhl+9Qhrlsp0a/OB6d0j 141 | u3MTnakoWB3Pf+TZihHhMi4uTnuxwEKcQ7J63a1Qy6lgtNOU++Myr+G6ARekOdSqDFdYjy 142 | xdABdGrJKrBTUMnsWH7T8Th8vhzNO2F/zCnM4fZpxKYl+Pjok4iGYsIv0ogw+6xvLlPlcr 143 | ptboVX6OTPUFS6opqq7y2WqpsaYgus9x+JkeRV4LfadAP8XLr8KkuR/WVIzRcQBAz0XYqm 144 | OiIAa4MZXYMv+B2u8Rk7wETzSK2x+VV5SikGYWDjp21J9WLj+91jXVR0h/HUg7UTmAQBS2 145 | HMAXP3Poc4PPFmUR0hW7bnmAFjDLlz0lhBSS4HWQdUtCd+86frqhKXQ6uTUgnXdXnRRdD1 146 | ljSooabKZOQl1TO8rypyEpvsZhI7B+1UjzCEAG4IyvfCZymy8fTORzNCtXE6WKxkpRMevc 147 | wrWY75HqrsMsvttCe1AgV+Lizh+d73BvQKSXohWfzPuldNCbGR5ZYrGxGLzEDa6Iuus1wn 148 | n3DMa0bJ2F8lJ4pZnkIgVjbGyAkXk/FELwSVa40BSBfepqipTle3EEQ/ZjXBitQJ2CilCL 149 | mlcZ1FvVypxGC7KaLlUWUmIoTbX0fC/FJSbknG3+23ky6PgT9Bbrxojpgjxg5VXVXuvkiy 150 | aD/KvI6vJ/0R1nEBKDDvrG+xrrZzsMADrAReFv8oV48cHVJRVeUBZ/eaBE8H2v20XXxbFx 151 | PM5NlAWXbVK6RbnDM8mW8iD9duQ+LT+TZqvHx2uI1CGkNnJineOuxCLrb1UsCFFJeL2SF5 152 | o0v5GwwnXNlCne8Xqzo5FCYZeGxo4gL415azbac+5fNqK3XvvUiXpcvmCHVv2dGRSeAU3N 153 | 78mdX7IE3JJJuI4ru3k32g1Zj6roA7s7xXGO65oNPigciXuM+p2DnoqI3OU6yDHUIR1qLE 154 | 2wBzQu/6792gc9VJl+U1ksN+VyhTvtKeZwlbyF0AnrdeKgnTwxOcJNmNRex1ocZwNdYItt 155 | PvvI5/9KKqYnhSJuKebnVjABG3SYISlxD5ezkIbb9cWJ1At9XtwT2sLkFYuHT949guF+Tb 156 | 1l7vvkxMUnMHq+NQr5OhTdhhxtPKAOn65SuOlP2v 157 | -----END OPENSSH PRIVATE KEY----- 158 | --------------------------------------------------------------------------------