already

【SSH】JSCH连接SSH报错:Invalid private

2022-11-18  本文已影响0人  Bogon

JSCH连接SSH报错:Invalid privatekey

image.png

环境版本号:
jsch: jsch-0.1.54.jar
SSH: OpenSSH_8.0p1, OpenSSL 1.0.2r 26 Feb 2019
jdk: 1.8

JSCH连接SSH报错:Invalid privatekey
https://blog.csdn.net/a17816876003/article/details/107457369

OPENSSH PRIVATE KEY转换为RSA PRIVATE KEY
http://www.mayanpeng.cn/archives/132.html

生成密钥时指定格式,ssh-keygen -m PEM -t rsa,加上参数-m PEM 和 -t rsa ,生成的密钥对。

 ssh-keygen  -m PEM  -t rsa  -b 4096
image.png
-m key_format
              Specify  a key format for key generation, the -i (import), -e (export) conversion options, and the -p change passphrase operation.  The latter may be used to convert between OpenSSH private key and PEM private key
              formats.  The supported key formats are: ``RFC4716'' (RFC 4716/SSH2 public or private key), ``PKCS8'' (PKCS8 public or private key) or ``PEM'' (PEM public key).  By default OpenSSH will write newly-generated  pri‐
              vate  keys  in its own format, but when converting public keys for export the default format is ``RFC4716''.  Setting a format of ``PEM'' when generating or updating a supported private key type will cause the key
              to be stored in the legacy PEM private key format.

-b bits
              Specifies  the number of bits in the key to create.  For RSA keys, the minimum size is 1024 bits and the default is 3072 bits.  Generally, 3072 bits is considered sufficient.  DSA keys must be exactly 1024 bits as
              specified by FIPS 186-2.  For ECDSA keys, the -b flag determines the key length by selecting from one of three elliptic curve sizes: 256, 384 or 521 bits.  Attempting to use bit lengths other than these three val‐
              ues for ECDSA keys will fail.  ECDSA-SK, Ed25519 and Ed25519-SK keys have a fixed length and the -b flag will be ignored.


-t dsa | ecdsa | ecdsa-sk | ed25519 | ed25519-sk | rsa
              Specifies the type of key to create.  The possible values are ``dsa'', ``ecdsa'', ``ecdsa-sk'', ``ed25519'', ``ed25519-sk'', or ``rsa''.

              This flag may also be used to specify the desired signature type when signing certificates using an RSA CA key.  The available RSA signature variants are ``ssh-rsa''  (SHA1  signatures,  not  recommended),  ``rsa-
              sha2-256'', and ``rsa-sha2-512'' (the default).
上一篇下一篇

猜你喜欢

热点阅读