关于secuCRT使用EC2的private key的解决办法(英文)

Unfortunately, there's not an easy way to import one of these keys for use with SecureCRT at the moment. I'll add a feature request for the capability of easily importing such keys for use with SecureCRT, but in the meantime, you might be interested in the following workaround.

Once you have the new private key generated, you'll need to copy the key to a linux/unix machine and convert the key to an openssh key using the openssh ssh-keygen utility. Here's how I was able to do it (I'm using the example private key available from the following Amazon (web page (http://docs.amazonwebservices.com/AmazonEC2/gsg/2007-01-03/running-an-instance.html)). I copied the private key text from Amazon's web site and pasted it into a vi session while connected with SecureCRT to a Redhat Linux system. Here's what the process looked like:

redhat [~/.ssh]-> vi AmazonEC2Key

[Go into insert mode and paste here, then save file and exit vi]

redhat [~/.ssh]-> cat AmazonEC2Key

-----BEGIN RSA PRIVATE KEY-----

MIIEoQIBAAKCAQBuLFg5ujHrtm1jnutSuoO8Xe56LlT+HM8v/xkaa39EstM3/aFxTHgElQiJLChp

HungXQ29VTc8rc1bW0lkdi23OH5eqkMHGhvEwqa0HWASUMll4o 3o/IX+0f2UcPoKCOVUR+jx71Sg

5AU52EQfanIn3ZQ8lFW7Edp5a3q4DhjGlUKToHVbicL5E+g45z fB95wIyywWZfeW/UUF3LpGZyq/

ebIUlq1qTbHkLbCC2r7RTn8vpQWp47BGVYGtGSBMpTRP5hnbzz uqj3itkiLHjU39S2sJCJ0TrJx5

i8BygR4s3mHKBj8l+ePQxG1kGbF6R4yg6sECmXn17MRQVXODNH ZbAgMBAAECggEAY1tsiUsIwDl5

91CXirkYGuVfLyLflXenxfI50mDFms/mumTqloHO7tr0oriHDR5K7wMcY/YY5YkcXNo7mvUVD1pM

ZNUJs7rw9gZRTrf7LylaJ58kOcyajw8TsC4e4LPbFaHwS1d6K8 rXh64o6WgW4SrsB6ICmr1kGQI7

3wcfgt5ecIu4TZf0OE9IHjn+2eRlsrjBdeORi7KiUNC/pAG23I6MdDOFEQRcCSigCj+4/mciFUSA

SWS4dMbrpb9FNSIcf9dcLxVM7/6KxgJNfZc9XWzUw77Jg8x92Zd0fVhHOux5IZC+UvSKWB4dyfcI 

tE8C3p9bbU9VGyY5vLCAiIb4qQKBgQDLiO24GXrIkswF32YtBB MuVgLGCwU9h9HlO9mKAc2m8Cm1

jUE5IpzRjTedc9I2qiIMUTwtgnw42auSCzbUeYMURPtDqyQ7p6 AjMujp9EPemcSVOK9vXYL0Ptco

xW9MC0dtV6iPkCN7gOqiZXPRKaFbWADp16p8UAIvS/a5XXk5jwKBgQCKkpHi2EISh1uRkhxljyWC

iDCiK6JBRsMvpLbc0v5dKwP5alo1fmdR5PJaV2qvZSj5CYNpMA y1/EDNTY5OSIJU+0KFmQbyhsbm

rdLNLDL4+TcnT7c62/aH01ohYaf/VCbRhtLlBfqGoQc7+sAc8vmKkesnF7CqCEKDyF/dhrxYdQKB

gC0iZzzNAapayz1+JcVTwwEid6j9JqNXbBc+Z2YwMi+T0Fv/P/hwkX/ypeOXnIUcw0Ih/YtGBVAC

DQbsz7LcY1HqXiHKYNWNvXgwwO+oiChjxvEkSdsTTIfnK4VSCv U9BxDbQHjdiNDJbL6oar92UN7V

rBYvChJZF7LvUH4YmVpHAoGAbZ2X7XvoeEO+uZ58/BGKOIGHByHBDiXtzMhdJr15HTYjxK7OgTZm

gK+8zp4L9IbvLGDMJO8vft32XPEWuvI8twCzFH+CsWLQADZMZK SsBasOZ/h1FwhdMgCMcY+Qlzd4

JZKjTSu3i7vhvx6RzdSedXEMNTZWN4qlIx3kR5aHcukCgYA9T+ Zrvm1F0seQPbLknn7EqhXIjBaT

P8TTvW/6bdPi23ExzxZn7KOdrfclYRph1LHMpAONv/x2xALIf91UB+v5ohy1oDoasL0gij1houRe

2ERKKdwz0ZL9SWq6VTdhr/5G994CK72fy5WhyERbDjUIdHaK3M849JJuf8cSrvSb4g==

-----END RSA PRIVATE KEY-----

[ now fix file permissions on this so that ssh-keygen doesn't bark at you]

redhat [~/.ssh]-> chmod og-r AmazonEC2Key

[ Now run ssh-keygen to rewrite the key in the OpenSSH format ]

redhat [~/.ssh]-> ssh-keygen -p -f AmazonEC2Key

Key has comment 'AmazonEC2Key'

Enter new passphrase (empty for no passphrase): 

Enter same passphrase again: 

Your identification has been saved with the new passphrase.

[ See how the written format compares with the original format above ]

redhat [~/.ssh]-> cat AmazonEC2Key

-----BEGIN RSA PRIVATE KEY-----

MIIEoQIBAAKCAQBuLFg5ujHrtm1jnutSuoO8Xe56LlT+HM8v/xkaa39EstM3/aFx

THgElQiJLChpHungXQ29VTc8rc1bW0lkdi23OH5eqkMHGhvEwq a0HWASUMll4o3o

/IX+0f2UcPoKCOVUR+jx71Sg5AU52EQfanIn3ZQ8lFW7Edp5a3q 4DhjGlUKToHVb

icL5E+g45zfB95wIyywWZfeW/UUF3LpGZyq/ebIUlq1qTbHkLbCC2r7RTn8vpQWp

47BGVYGtGSBMpTRP5hnbzzuqj3itkiLHjU39S2sJCJ0TrJx5i8 BygR4s3mHKBj8l

+ePQxG1kGbF6R4yg6sECmXn17MRQVXODNHZbAgMBAAECggEAY1 tsiUsIwDl591CX

irkYGuVfLyLflXenxfI50mDFms/mumTqloHO7tr0oriHDR5K7wMcY/YY5YkcXNo7

mvUVD1pMZNUJs7rw9gZRTrf7LylaJ58kOcyajw8TsC4e4LPbFa HwS1d6K8rXh64o

6WgW4SrsB6ICmr1kGQI73wcfgt5ecIu4TZf0OE9IHjn+2eRlsr jBdeORi7KiUNC/

pAG23I6MdDOFEQRcCSigCj+4/mciFUSASWS4dMbrpb9FNSIcf9dcLxVM7/6KxgJN

fZc9XWzUw77Jg8x92Zd0fVhHOux5IZC+UvSKWB4dyfcItE8C3p 9bbU9VGyY5vLCA

iIb4qQKBgQDLiO24GXrIkswF32YtBBMuVgLGCwU9h9HlO9mKAc 2m8Cm1jUE5IpzR

jTedc9I2qiIMUTwtgnw42auSCzbUeYMURPtDqyQ7p6AjMujp9E PemcSVOK9vXYL0

PtcoxW9MC0dtV6iPkCN7gOqiZXPRKaFbWADp16p8UAIvS/a5XXk5jwKBgQCKkpHi

2EISh1uRkhxljyWCiDCiK6JBRsMvpLbc0v5dKwP5alo1fmdR5P JaV2qvZSj5CYNp

MAy1/EDNTY5OSIJU+0KFmQbyhsbmrdLNLDL4+TcnT7c62/aH01ohYaf/VCbRhtLl

BfqGoQc7+sAc8vmKkesnF7CqCEKDyF/dhrxYdQKBgC0iZzzNAapayz1+JcVTwwEi

d6j9JqNXbBc+Z2YwMi+T0Fv/P/hwkX/ypeOXnIUcw0Ih/YtGBVACDQbsz7LcY1Hq

XiHKYNWNvXgwwO+oiChjxvEkSdsTTIfnK4VSCvU9BxDbQHjdiN DJbL6oar92UN7V

rBYvChJZF7LvUH4YmVpHAoGAbZ2X7XvoeEO+uZ58/BGKOIGHByHBDiXtzMhdJr15

HTYjxK7OgTZmgK+8zp4L9IbvLGDMJO8vft32XPEWuvI8twCzFH +CsWLQADZMZKSs

BasOZ/h1FwhdMgCMcY+Qlzd4JZKjTSu3i7vhvx6RzdSedXEMNTZWN4ql Ix3kR5aH

cukCgYA9T+Zrvm1F0seQPbLknn7EqhXIjBaTP8TTvW/6bdPi23ExzxZn7KOdrfcl

YRph1LHMpAONv/x2xALIf91UB+v5ohy1oDoasL0gij1houRe2ERKKdwz0ZL9SWq6 

VTdhr/5G994CK72fy5WhyERbDjUIdHaK3M849JJuf8cSrvSb4g==

-----END RSA PRIVATE KEY-----

[ Now create a .pub file by extracting the public portion of the key file. SecureCRT will require both the private key and the public key ]

redhat [~/.ssh]-> ssh-keygen -e -f AmazonEC2Key >> AmazonEC2Key.pub

redhat [~/.ssh]-> cat AmazonEC2Key.pub 

---- BEGIN SSH2 PUBLIC KEY ----

Comment: "2047-bit RSA, converted from OpenSSH by user@host"

AAAAB3NzaC1yc2EAAAADAQABAAABAG4sWDm6Meu2bWOe61K6g7 xd7nouVP4czy//GRprf0

Sy0zf9oXFMeASVCIksKGke6eBdDb1VNzytzVtbSWR2Lbc4fl6q QwcaG8TCprQdYBJQyWXi

jej8hf7R/ZRw+goI5VRH6PHvVKDkBTnYRB9qcifdlDyUVbsR2nlrergOGMa VQpOgdVuJwv

kT6DjnN8H3nAjLLBZl95b9RQXcukZnKr95shSWrWpNseQtsILa vtFOfy+lBanjsEZVga0Z

IEylNE/mGdvPO6qPeK2SIseNTf1LawkInROsnHmLwHKBHizeYcoGPyX54 9DEbWQZsXpHjK

DqwQKZefXsxFBVc4M0dls=

---- END SSH2 PUBLIC KEY ----

At this point, I was able to use the SFTP tab of SecureCRT to securely copy (as ASCII) the AmazonEC2Key* files to my local Windows machine and point my SecureCRT session to use them with publickey authentication.

sftp> pwd

/home/user

sftp> cd .ssh

sftp> pwd

/home/user/.ssh

sftp> ls A*

AmazonEC2Key AmazonEC2Key.pub

sftp> get -a AmazonEC2Key

Downloading AmazonEC2Key from /home/user/.ssh/AmazonEC2Key

100% 1KB 1KB/s 00:00:00 

sftp> get -a AmazonEC2Key.pub

Downloading AmazonEC2Key.pub from /home/user/.ssh/AmazonEC2Key.pub

100% 515 bytes 515 bytes/s 00:00:00 

sftp> lpwd

C:\temp

总结:使用openssh ssh-keygen将.pem转换为openssh格式的key。1、上传gsg-keypair.pem到一台linux服务器上2、cat gsg-keypair.pem>amazonec2key3、chmod 600 amazonec2key4、ssh-keygen -p -f amazonec2key5、ssh-keygen -e -f amazonec2key >> amazonec2key.pub6、使用amazonec2key做为secuCRT的key文件。

时间: 2024-08-04 14:42:33

关于secuCRT使用EC2的private key的解决办法(英文)的相关文章

Mac系统上Vmware虚拟机无法识别USB Key完美解决办法

  最近在使用电脑的时候需要用到加密锁,就是一个USBKey,但是发现在VMWare虚拟机下,这个USB设备根本不会出现在USB设备列表里,也就无法通过虚拟机进行连接了,导致在虚拟机下面的windows里,根本不会有这个设备,无奈通过bootcamp启动windows系统,是可以识别出这个设备并且可以正常使用的,而且在Mac系统下的系统信息里也能看到这个设备的信息,说明设备没有问题,应该是VMWare的问题. 过程: 在网上找资料,发现有很多说"网银"的USB Key也有类似情况的帖子

mysql 出现Error: Duplicate entry “xxxx” for key 1解决办法

所出错形式如下: Discuz! info: MySQL Query Error User: 爱我荆门 Time: 2007-3-5 11:00am Script: /bbs/post.php SQL: INSERT INTO cd12sb_threads (fid, readperm, price, iconid, typeid, author, authorid, subject, dateline, lastpost, lastposter, displayorder, digest, b

mysql提示 Duplicate entry..for key错误解决办法

如:Duplicate entry for key 3的意思是表的第3个字段出现了唯一索引的限制,需要插入其它不重复的值或去掉字段的unique属性. 看一个实例 如果您的站点上有 phpMyAdmin ,还可以通过它他检查下您的数据库中出错的表的自增字段的当前自增值是否和该表中自增字段的最大值相同,如果相同则会出现该错误. 如何检查? 1)进入您的 phpMyAdmin ,然后在左侧选择您出错的数据库. 2)选择您出错的表,并找到该表的自增字段,有 auto_increment 标识的字段即为

如何让OpenSSL得到JKS格式的keystore中的public and private key

国内私募机构九鼎控股打造APP,来就送 20元现金领取地址:http://jdb.jiudingcapital.com/phone.html内部邀请码:C8E245J (不写邀请码,没有现金送)国内私募机构九鼎控股打造,九鼎投资是在全国股份转让系统挂牌的公众公司,股票代码为430719,为"中国PE第一股",市值超1000亿元.  -------------------------------------------------------- 从一个JKS的keystore中导出pub

openssl_sign(): supplied key param cannot be coerced into a private key

PHP RSA 报错 openssl_sign(): supplied key param cannot be coerced into a private key 原因: 本地测试正常,服务器报错 使用测试数据和测试秘钥,本地和服务器都正常 这种情况说明与PHP和OPENSSL版本无关(已经重新编译过PHP和OPENSSL,浪费好多时间) 解决方式: http://www.itguai.com/php/a5246028.html 看了这篇文章,终于找到解决方式了, RSA 的秘钥一般都有固定换

Ruby定义私有方法(private)的两种办法

  这篇文章主要介绍了Ruby定义私有方法(private)的两种办法,本文直接给出代码实例,需要的朋友可以参考下 ? 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 #定义私有方法途径1: class C def public_method private_method end   def private_method end   private :private_method #定义方法为私有 end   #定义私

苹果笔记本VMWare虚拟机无法识别出USB Key解决办法

  解决思路: 对苹果系统来说,键盘和触摸板都是统一按照USB设备来识别和使用的,它们的类型是HID设备,为是USB设备的一种,HID就是人体学输入设备的英文简写.我们此次连接的USB Key属于HID设备,而VMWare的默认设置,是不会把HID设备列在USB设备的列表中的,我们只需要在VMWare中计入一段代码,该代码的意思是让VMWare显示出所有的USB设备,不要屏蔽HID设备.知道这个原理后,我们讲解下具体解决思路. 苹果笔记本VMWare虚拟机无法识别出USB Key解决办法1.打开

为什么连接EC2那么卡?有什么解决办法?

问题描述 如题:为什么连接EC2那么卡?有什么解决办法? 解决方案 解决方案二:我现在是用阿里云ECS做跳板机连接的EC2,直接连卡爆了,不知道为什么那么卡.解决方案三:只能忍了,运营商出口带宽不够我用的是日本的vps作跳板解决方案四:引用2楼aws0to1的回复: 只能忍了,运营商出口带宽不够我用的是日本的vps作跳板 用日本的VPS作跳板延时大么?解决方案五:从中国到日本icmp_seq=4ttl=48time=84.717ms从日本到us-east-1icmp_seq=2ttl=49tim

MySQL错误“Specified key was too long; max key length is 1000 bytes”的解决办法

MySQL错误"Specified key was too long; max key length is 1000 bytes"的解决办法 经过查询才知道,是Mysql的字段设置的太长了,于是我把这两个字段的长度改了一下就好了.  建立索引时,数据库计算key的长度是累加所有Index用到的字段的char长度后再按下面比例乘起来不能超过限定的key长度1000:  latin1 = 1 byte = 1 character  uft8 = 3 byte = 1 character