Sshd Allow root to Authenticate with Passwordless Public Key: Difference between revisions

From NovaOrdis Knowledge Base
Jump to navigation Jump to search
No edit summary
Line 5: Line 5:
=Overview=
=Overview=


'root' is allowed to authenticate against the sshd server with a passwordless public key if its "authorized_keys" is set up as described here <font color=red>???</font> and the server is configured with ...., '''unless [[Selinux|SELinux]] is being enforced on the host'''.
'root' is allowed to authenticate against the sshd server with a passwordless public key if its "authorized_keys" is set up as described here <font color=red>???</font> and the server is configured with ...., ''unless [[Selinux|SELinux]] is being enforced on the host''.


If [[Selinux|SELinux]] is being enforced, an attempt to authenticate using a passwordless public key generates the following entry in the sshd server log (in debug mode):
If [[Selinux|SELinux]] is being enforced, an attempt to authenticate using a passwordless public key generates the following entry in the sshd server log (in debug mode):


  Could not open authorized keys '/root/.ssh/authorized_keys': Permission denied
  Could not open authorized keys '/root/.ssh/authorized_keys': Permission denied

Revision as of 21:29, 2 July 2017

Internal

Overview

'root' is allowed to authenticate against the sshd server with a passwordless public key if its "authorized_keys" is set up as described here ??? and the server is configured with ...., unless SELinux is being enforced on the host.

If SELinux is being enforced, an attempt to authenticate using a passwordless public key generates the following entry in the sshd server log (in debug mode):

Could not open authorized keys '/root/.ssh/authorized_keys': Permission denied