I am trying to satisfy a weird case, so bear with me please.
I want to use [don't gasp] graphical Windows tools (like WinSCP, PuTTY, etc) with signed OpenSSH keys. These tools don't support signed keys. But they do support a whole lot of "forwarding" and "proxy" methods.
I can set them up with a "local proxy" that actually executes OpenSSH command with the signed keys to the same server and setups up a tunnel: local port 2222 forwards to server's 127.0.0.1:22
Great, now the Windows tools can execute ssh/scp commands over the already-authenticated tunnel... but the first thing they try to do is: open ssh and authenticate (and they can't pass a signed key...).
So, since I already authenticated on the tunnel, can I configure the remote machine's ssh server to NOT ask nor for password, nor key, if the connection attempt is done over 127.0.0.1:22?
Please note I am not talking about a "jump" server to reach "remote". I only have 1 "remote" server.
TL;DR:
On my Ubuntu server, I want to do ssh user@127.0.0.1 and not be asked for key or password, but only if request came from 127.0.0.1
Matchsection at the bottom of the config file, or you need to close it byMatch alldirective. Ref.: https://askubuntu.com/a/905799/566421 – pa4080 Jan 26 '20 at 09:00