From caefe6bc471e550615a14c63e339d551e7fac36c Mon Sep 17 00:00:00 2001 From: manojampalam Date: Tue, 13 Oct 2015 14:44:45 -0700 Subject: [PATCH] Deployment Instructions --- Deploy-Win32-OpenSSH.md | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 Deploy-Win32-OpenSSH.md diff --git a/Deploy-Win32-OpenSSH.md b/Deploy-Win32-OpenSSH.md new file mode 100644 index 0000000..0f2d865 --- /dev/null +++ b/Deploy-Win32-OpenSSH.md @@ -0,0 +1,21 @@ +1. Download Zip file - +* Extract contents +* Setup SSH host keys + * ssh-keygen.exe -t rsa -f ssh_host_rsa_key + * ssh-keygen.exe -t dsa -f ssh_host_dsa_key + * ssh-keygen.exe -t ecdsa -f ssh_host_ecdsa_key + * ssh-keygen.exe -t ed25519 -f ssh_host_ed25519_key +* Install key-auth package if you need key-based authentication + * run setup-ssh-lsa.cmd + * reboot +* Run SSH daemon as System (See below for alternative options) + * Download PSTools from [SysInternals](https://technet.microsoft.com/en-us/sysinternals/bb897553) + * psexec.exe -i -s cmd.exe + * Within cmd.exe - launch sshd.exe +* Running SSH daemon as Admin user + * Note - SSH daemon needs to run as System to support key-based authentication + * Give Admin user SE_ASSIGNPRIMARYTOKEN_NAME (steps below) + * secpol.msc -> Local Policies -> UserRightsAssessment + * Add the Admin user to "Replace a process level token" + * Log off and Log in. + * In elevated cmd.exe, start sshd.exe