Skip to content

Commit c997361

Browse files
committed
Learn Editor: Update set-up-fips-compliant-secure-remote-linux-development.md
1 parent b103c9a commit c997361

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed

docs/linux/set-up-fips-compliant-secure-remote-linux-development.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ The examples in this article use Ubuntu 18.04 LTS with OpenSSH server version 7.
4848
```
4949

5050
> [!NOTE]
51-
> `ssh-rsa` is the only FIPS compliant host key algorithm VS supports. The `aes*-ctr` algorithms are also FIPS compliant, but the implementation in Visual Studio isn't approved. The `ecdh-*` key exchange algorithms are FIPS compliant, but Visual Studio doesn't support them.
51+
> `ssh-rsa`, `rsa-sha2-*`, `ecdsa-sha2-*` are the only FIPS compliant host key algorithms VS supports. For more information about what algorithms Visual Studio supports, see [Supported SSH Algorithms](./connect-to-your-remote-linux-computer.md#supported-ssh-algorithms).
5252
5353
You're not limited to these options. You can configure `ssh` to use other ciphers, host key algorithms, and so on. Some other relevant security options you may want to consider are `PermitRootLogin`, `PasswordAuthentication`, and `PermitEmptyPasswords`. For more information, see the `man` page for `sshd_config` or the article [SSH Server Configuration](https://www.ssh.com/ssh/sshd_config).
5454

@@ -58,35 +58,35 @@ The examples in this article use Ubuntu 18.04 LTS with OpenSSH server version 7.
5858
sudo service ssh restart
5959
```
6060

61-
Next, you'll create an RSA key pair on your Windows computer. Then you'll copy the public key to the remote Linux system for use by `ssh`.
61+
Next, you'll create an ECDSA key pair on your Windows computer. Then you'll copy the public key to the remote Linux system for use by ssh.
6262

63-
### To create and use an RSA key file
63+
### To create and use an ECDSA key file
6464

65-
1. On the Windows machine, generate a public/private RSA key pair by using this command:
65+
1. On the Windows machine, generate a public/private ECDSA key pair by using this command:
6666

6767
```cmd
68-
ssh-keygen -t rsa -b 4096 -m PEM
68+
ssh-keygen -t ecdsa -m PEM
6969
```
7070

71-
The command creates a public key and a private key. By default, the keys are saved to *`%USERPROFILE%\.ssh\id_rsa`* and *`%USERPROFILE%\\.ssh\\id_rsa.pub`*. (In PowerShell, use `$env:USERPROFILE` instead of the cmd macro `%USERPROFILE%`) If you change the key name, use the changed name in the steps that follow. We recommend you use a passphrase for increased security.
71+
The command creates a public key and a private key. By default, the keys are saved to %USERPROFILE%\.ssh\id_ecdsa and %USERPROFILE%\.ssh\id_ecdsa.pub. (In PowerShell, use $env:USERPROFILE instead of the cmd macro %USERPROFILE%) Keys generated with RSA are also supported. If you change the key name, use the changed name in the steps that follow. We recommend you use a passphrase for increased security.
7272

7373
1. From Windows, copy the public key to the Linux machine:
7474

7575
```cmd
76-
scp %USERPROFILE%\.ssh\id_rsa.pub user@hostname:
76+
scp %USERPROFILE%\.ssh\id_ecdsa.pub user@hostname:
7777
```
7878

7979
1. On the Linux system, add the key to the list of authorized keys, and ensure the file has the correct permissions:
8080

8181
```bash
82-
cat ~/id_rsa.pub >> ~/.ssh/authorized_keys
82+
cat ~/id_ecdsa.pub >> ~/.ssh/authorized_keys
8383
chmod 600 ~/.ssh/authorized_keys
8484
```
8585

8686
1. Now, you can test to see if the new key works in `ssh`. Use it to sign in from Windows:
8787

8888
```cmd
89-
ssh -i %USERPROFILE%\.ssh\id_rsa user@hostname
89+
ssh -i %USERPROFILE%\.ssh\id_ecdsa user@hostname
9090
```
9191
9292
You've successfully set up `ssh`, created and deployed encryption keys, and tested your connection. Now you're ready to set up the Visual Studio connection.
@@ -100,11 +100,11 @@ You've successfully set up `ssh`, created and deployed encryption keys, and test
100100
1. In the Connection Manager dialog, choose the **Add** button to add a new connection.
101101
102102
![Screenshot showing the options pane in the Connection Manager dialog. Cross Platform > C plus plus > Connection Manager is highlighted.](media/settings_connectionmanager.png)
103-
104-
The **Connect to Remote System** window is displayed.
103+
104+
The **Connect to Remote System** window is displayed.
105105
106106
![Screenshot showing the Connect to Remote System window, which has text boxes for the host name, port, user name, auth type, and password.](media/connect.png)
107-
107+
108108
1. In the **Connect to Remote System** dialog, enter the connection details of your remote machine.
109109
110110
| Entry | Description |
@@ -125,8 +125,8 @@ You've successfully set up `ssh`, created and deployed encryption keys, and test
125125
If the connection fails, the entry boxes that need to be changed are outlined in red.
126126
127127
![Screenshot of the Connect to Remote System window which has host name and port text boxes outlined in red to indicate they need to be changed.](media/settings_connectionmanagererror.png)
128-
129-
For more information on troubleshooting your connection, see [Connect to your remote Linux computer](connect-to-your-remote-linux-computer.md).
128+
129+
For more information on troubleshooting your connection, see [Connect to your remote Linux computer](connect-to-your-remote-linux-computer.md).
130130
131131
## Command-line utility for the Connection Manager
132132

0 commit comments

Comments
 (0)