I'm supposed to be accessing a server in order to link a company's staging and live servers into our deployment loop. An admin over on their side set up the two instances and then created a user on the server for us to SSH in as. This much I'm used to.
In my mind now what would happen is I would send them my public key which could be placed inside their authorized keys folder. Instead however they sent me a file name id_rsa
which inside the file contains -----BEGIN RSA PRIVATE KEY-----
over email. Is this normal?
I looked around and can find tonnes of resources on generating and setting up my own keys from scratch, but nothing about starting from the private keys of the server. Should I be using this to generate some key for myself or?
I would ask the system admin directly but don't want to appear an idiot and waste everybody in-between us' time. Should I just ignore the key he sent me and ask them to put my public key inside their authorized folder?
-----BEGIN RSA PRIVATE KEY-----
over e-mail is the next scary thing after seeing a user named'); DROP DATABASE;--
in your username table. – Dmitry Grigoryev Dec 07 '16 at 13:46'); DROP DATABASE;--
as a username in your database table - it shows you've been escaping user input correctly – HorusKol Dec 07 '16 at 21:55Database 'production' doesn't exist
– Paul Draper Dec 08 '16 at 05:05