Acho que você está procurando esse bit que é abordado na documentação do ssh.com, no Seção de Chaves PGP .
trechoSSH Secure Shell only supports the OpenPGP standard and the PGP programs conforming to it. GnuPG is used in the following instructions. If you use PGP, the only difference is that the file extension is pgp instead of GnuPGP's gpg.
To make sure that user public-key authentication is enabled, the
AllowedAuthentications
field both in the/etc/ssh2/sshd2_config
file on Remote and the/etc/ssh2/ssh2_config
file on Local should contain the word "publickey":AllowedAuthentications publickey
Other authentication methods can be listed in the configuration file as well. Copy your private key ring (
secring.gpg
) to the~/.ssh2
directory on Local. Create an identification file in your~/.ssh2
directory on Local if you do not already have one. Add the following lines to the identification file:PgpSecretKeyFile <filename of the user's private key ring> IdPgpKeyName <name of the OpenPGP key in PgpSecretKeyFile> IdPgpKeyFingerprint <fingerprint of OpenPGP key in PgpSecretKeyFile> IdPgpKeyId <id of the OpenPGP key in PgpSecretKeyFile>
Copy your public-key ring (
pubring.gpg
) to the~/.ssh2
directory on Remotescp2 pubring.gpg user@remote_host:.ssh2
Create an authorization file in your
~/.ssh2
directory on Remote. Add the following lines to the authorization file:PgpPublicKeyFile <filename of the user's public-key ring> PgpKeyName <name of the OpenPGP key> PgpKeyFingerprint <fingerprint the OpenPGP key> PgpKeyId <id of the OpenPGP key>
Now you should be able to login to Remote from Local using Secure Shell. Try to login:
Local>ssh Remote Passphrase for pgp key "user (comment) <user@Local>":
After you have entered the passphrase of your PGP key, a Secure Shell connection will be established.