Skip to content

SSH

Integrate Linux systems with vScope via SSH to retrieve comprehensive system data, such as CPU, memory, storage, and network configurations. vScope supports two authentication methods:

  • User & Password Credential
  • Private Key Credential

Setting Up Public Key Authentication

For public key authentication, select Private Key Credential in the credential type dropdown.

Requirements: vScope currently does not support the Putty format. Instead, convert the key to OPENSSH format with the following structure:

-----BEGIN OPENSSH PRIVATE KEY-----
[Private Key Content]
-----END OPENSSH PRIVATE KEY-----

SSH Probing Process

  1. Identify System Flavor
    vScope begins by running the command uname -a to identify the Unix-like OS flavor of the target system.

  2. Running Commands
    For each command it intends to run, vScope first checks if the command is available on the target system:

    • It issues command -v {cmd} to confirm the command’s availability.
    • If the command is not found this way, it also searches in /sbin and /usr/sbin.
  3. Handling Permissions with Sudo
    If vScope encounters a “Permission denied” error when trying to run a command, it checks whether the current user can use sudo by running sudo -v.

    • If the sudo check is successful, vScope retries the command with elevated privileges using sudo {cmd}.
    • If the sudo check fails, vScope will skip sudo for all subsequent commands within that SSH session.
  4. Reading Files
    When attempting to read files, vScope first verifies that the file exists on the target system using test -f {file}. Only if the file exists will vScope attempt to read it.

Supported Algorithms in the SSH Probe

The SSH probe in vScope uses the following encryption algorithms when connecting to Linux/Unix systems.

Ciphers

  • aes{128,192,256}-{cbc,ctr}, blowfish-{cbc,ctr}, 3des-{cbc,ctr}, arcfour{128,256}, among others.
  • Extended ciphers: camellia{128,192,256}-{cbc,ctr}, camellia{128,192,256}-{cbc,ctr}@openssh.org

Key Exchange

  • Supported: diffie-hellman-group1-sha1, ecdh-sha2-nistp{256,384,521}, curve25519-sha256@libssh.org, and more.

Signatures

  • ssh-rsa, ssh-dss, ecdsa-sha2-nistp{256,384,521}, ssh-ed25519

MAC

  • hmac-md5, hmac-sha1, hmac-sha2-256, hmac-sha2-512