You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/linux/set-up-fips-compliant-secure-remote-linux-development.md
+9-9Lines changed: 9 additions & 9 deletions
Original file line number
Diff line number
Diff line change
@@ -48,7 +48,7 @@ The examples in this article use Ubuntu 18.04 LTS with OpenSSH server version 7.
48
48
```
49
49
50
50
> [!NOTE]
51
-
> `ssh-rsa` is the only FIPS compliant host key algorithm VS supports. The `aes*-ctr` algorithms are also FIPS compliant, but the implementation in Visual Studio isn't approved. The `ecdh-*` key exchange algorithms are FIPS compliant, but Visual Studio doesn't support them.
51
+
> `ssh-rsa`, `rsa-sha2-*`, and `ecdsa-sha2-*` are the only FIPS compliant host key algorithms VS supports. For more information about the algorithms Visual Studio supports, see [Supported SSH Algorithms](connect-to-your-remote-linux-computer.md#supported-ssh-algorithms).
52
52
53
53
You're not limited to these options. You can configure `ssh` to use other ciphers, host key algorithms, and so on. Some other relevant security options you may want to consider are `PermitRootLogin`, `PasswordAuthentication`, and `PermitEmptyPasswords`. For more information, see the `man` page for `sshd_config` or the article [SSH Server Configuration](https://www.ssh.com/ssh/sshd_config).
54
54
@@ -58,35 +58,35 @@ The examples in this article use Ubuntu 18.04 LTS with OpenSSH server version 7.
58
58
sudo service ssh restart
59
59
```
60
60
61
-
Next, you'll create an RSA key pair on your Windows computer. Then you'll copy the public key to the remote Linux system for use by `ssh`.
61
+
Next, you'll create an ECDSA key pair on your Windows computer. Then you'll copy the public key to the remote Linux system for use by ssh.
62
62
63
-
### To create and use an RSA key file
63
+
### To create and use an ECDSA key file
64
64
65
-
1. On the Windows machine, generate a public/private RSA key pair by using this command:
65
+
1. On the Windows machine, generate a public/private ECDSA key pair by using this command:
66
66
67
67
```cmd
68
-
ssh-keygen -t rsa -b 4096 -m PEM
68
+
ssh-keygen -t ecdsa -m PEM
69
69
```
70
70
71
-
The command creates a public key and a private key. By default, the keys are saved to *`%USERPROFILE%\.ssh\id_rsa`* and *`%USERPROFILE%\\.ssh\\id_rsa.pub`*. (In PowerShell, use `$env:USERPROFILE` instead of the cmd macro `%USERPROFILE%`) If you change the key name, use the changed name in the steps that follow. We recommend you use a passphrase for increased security.
71
+
The command creates a public key and a private key. By default, the keys are saved to %USERPROFILE%\.ssh\id_ecdsa and %USERPROFILE%\.ssh\id_ecdsa.pub. (In PowerShell, use $env:USERPROFILE instead of the cmd macro %USERPROFILE%) Keys generated with RSA are also supported. If you change the key name, use the changed name in the steps that follow. We recommend you use a passphrase for increased security.
72
72
73
73
1. From Windows, copy the public key to the Linux machine:
1. On the Linux system, add the key to the list of authorized keys, and ensure the file has the correct permissions:
80
80
81
81
```bash
82
-
cat ~/id_rsa.pub >>~/.ssh/authorized_keys
82
+
cat ~/id_ecdsa.pub >>~/.ssh/authorized_keys
83
83
chmod 600 ~/.ssh/authorized_keys
84
84
```
85
85
86
86
1. Now, you can test to see if the new key works in `ssh`. Use it to sign in from Windows:
87
87
88
88
```cmd
89
-
ssh -i %USERPROFILE%\.ssh\id_rsa user@hostname
89
+
ssh -i %USERPROFILE%\.ssh\id_ecdsa user@hostname
90
90
```
91
91
92
92
You've successfully set up `ssh`, created and deployed encryption keys, and tested your connection. Now you're ready to set up the Visual Studio connection.
0 commit comments