Clion Ssh Key



SSH, or Secure Shell, is a very common way to securely access remote machines, typically via the command line. It aims at ensuring that your connection, and therefore all data passed, is free from eavesdropping. Because of this, there are quite a few checks built-in to the popular SSH clients, like OpenSSH, that ensure your connection can't be compromised.

Clion

The command to send a file to your remote server, using your ssh key, is (assuming you accepted the default name for your ssh key upon creation): scp -i /.ssh/idrsa.pub FILENAME USER@SERVER. I'm trying to use IntelliJ (well, actually CLion) with Perforce via ssh. In order for this to work, the key needs to be loaded permanently. Normally this works for me with ssh-agent, for which i enter the key password once and it keeps it loaded. However, when I launch CLion, it doesn't see the ssh-agent at all and prompts me to enter password.

  • Start the program and on the Session tab set the hostname to the name or IP address of your server, the protocol to SSH and save the session as SvnConnection or whatever name you prefer. On the SSH tab set the preferred SSH protocol version to 2 and from Auth set the full path to the.PPK private key file you converted earlier.
  • Open PuTTYgen, and click the generate button to start creating a key: After simulating an earthquake with your mouse, you should have a shiny new SSH key. Give it a secure passphrase, and then save the private key somewhere safe.

An example of one of these checks is the following, which identifies when the fingerprint of a server has changed:

When you connect to a server via SSH, it gets a fingerprint for the ECDSA key, which it then saves to your home directory under ~/.ssh/known_hosts. This is done after first connecting to the server, and will prompt you with a message like this:

If you enter 'yes', then the fingerprint is saved to the known_hosts file, which SSH then consults every time you connect to that server.

But what happens if a server's ECDSA key has changed since you last connected to it? This is alarming because it could actually mean that you're connecting to a different server without knowing it. If this new server is malicious then it would be able to view all data sent to and from your connection, which could be used by whoever set up the server. This is called a man-in-the-middle attack. This scenario is exactly what the 'WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!' message is trying to warn you about.

Clion Ssh Key Ubuntu

Key

Clion Ssh

Of course, this isn't always the case, and there are many reasons for the ECDSA key fingerprint to change for a server. In my case, I had an elastic IP address on AWS and assigned it to a different server after redeploying our application. The IP address and hostname I was connecting to were the same, but the underlying server was different, which is what tripped the SSH client to issue this warning.

Fixing the Issue

If you are 100% sure that this was expected behavior and that there is no potential security issue, you'll need to fix the issue before continuing.

The easiest ways I've found to fix this problem is the following two solutions.

Manually Resolve via known_hosts

  • In the warning message find the line that tells you where the offending ECDSA key is located in the known_hosts file. In my example this line said 'Offending ECDSA key in /Users/scott/.ssh/known_hosts:47', which refers to line 47.
  • Open the known_hosts file specified in the warning message
  • Delete the line specified in the warning message

By deleting this line, your SSH client won't have an ECDSA key fingerprint to compare to, and thus will ask you again to verify the authenticity of the server the next time you connect. Once done, you'll have a new fingerprint in our known_hosts file for this server, and the warning will be gone.

Resolve Using ssh-keygen

Another solution would be to use the ssh-keygen utility to delete the offending key from your known_hosts file, which can be done with the following command:

So in my example I'd use it like this:

This method is good if you don't want to manually alter the known_hosts file yourself, and the utility is easier to use if you have multiple hostnames and IP addresses to fix. It can also handle hashed hostnames in a known_hosts.old file.

Skip to end of metadataGo to start of metadata

Clion Ssh Key Linux

Core. IndexingPerformanceIDEA-251642Indexing dependncies hangs
Core. SSHBugIDEA-247283SSH can't juxtapose a public key file with a public key from the agent if there's no private key file
EditorBugIDEA-248406External annotations and code vision hints aren't shown if javadoc comment is shown in rendered form
User Interface. ControlsBugIDEA-248210'Find' and 'Replace' don't remember text area size
User Interface. Embedded Browser (JCEF)BugIDEA-250937forward jcef log to user home
Version ControlBugIDEA-252307Rebase modal no longer stores previously selected ref or options
BugIDEA-249948New git repositories do not show up in VCS dialog
Version Control. GitBugIDEA-248795gitignore is not created during project creation in WebStorm
UsabilityIDEA-253889Git Rebase dialog: copy the value from upstream to --onto field when it is added
UsabilityIDEA-251554Pull-dialog: suggests pulling from the last entered branch, instead from tracked branch
ConsoleBugPY-45049Types and parameters aren't shown in completion in Python Console
BugPY-30650iPython console gets totally unresponsive when using large Pandas Dataframe
DebuggerTaskPY-44450Consider disabling the 'Drop into debugger on failed tests' flag by default
Test RunnerBugPY-43632Unittest run configuration has two 'Additional Arguments' fields