Skip to content

Conversation

@vincentbernat
Copy link
Contributor

The current logic around the SSH agent is flawed and tentatives to fix it to cover more cases only leads to more complexity.

As seen in #648, to this day, nobody really knows why we disable the agent. In the meantime, many valid use cases just don't work because of disabling the agent, including the good practice to use encrypted private key files. I think it is time to bite the bullet and just leave the agent always on: "ssh" from OpenSSH does not have an option to disable the agent and nobody complains about this.

The current logic around the SSH agent is flawed and tentatives to fix
it to cover more cases only leads to more complexity.

As seen in Juniper#648, to this day, nobody really knows why we disable the
agent. In the meantime, many valid use cases just don't work because of
disabling the agent, including the good practice to use encrypted
private key files. I think it is time to bite the bullet and just leave
the agent always on: "ssh" from OpenSSH does not have an option to
disable the agent and nobody complains about this.
@gaima8
Copy link

gaima8 commented Nov 25, 2023

Can confirm this works.
Better than my patches #1284 and Juniper/ansible-junos-stdlib#634 as this only requires the one change here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants