I could be wrong too, but I really don't think so. AFAIK it would require openssh to be configured to trust a CA, and client certs would have to have been issued (signed) by that CA. I don't think a self-signed cert would work. There has been talk about implementing it in opnsense (https://github.com/opnsense/core/issues/6007), but I don't think it has actually happened, so you get people trying to hack around it like https://forum.opnsense.org/index.php?topic=43142.0
SSH does not use the TLS certificate hierarchy.
Quote from: bimbar on October 31, 2024, 01:33:43 pmSSH does not use the TLS certificate hierarchy.Not sure what you're saying here - SSH does not use SSL or TLS, but it *can* (generally, outside the context of OPNsense) do certificate-based authentication (both server and client) in a similar manner.
@cookiemonster SSH keys are not certificates. Two different things. And you should not use ssh-copy-id, because the key does not end in the configuration. Use the UI, System > Access > Users and upload a key, not a certificate.
p.s. your requirements would be easily met if you did not use it.
But you have not yet explained why you think you need SSH access in the first place. All logfiles are accessible in the web UI.
Quotep.s. your requirements would be easily met if you did not use it.Is there another Windows GUI SSH option? Putty works really good for every other machine I have tried to ssh into.Is there a post somewhere that list the SSH key requirements? Putty has a ton of tweeks where I can set the algorithm, cipher, GSSAPI and so much more.