Sshd Allow root to Authenticate with Passwordless Public Key: Difference between revisions

From NovaOrdis Knowledge Base
Jump to navigation Jump to search
Line 10: Line 10:


  Could not open authorized keys '/root/.ssh/authorized_keys': Permission denied
  Could not open authorized keys '/root/.ssh/authorized_keys': Permission denied
Turning the SELinux in permissive mode will allow the root to log in, but usually this is NOT a good idea.

Revision as of 21:30, 2 July 2017

Internal

Overview

'root' is allowed to authenticate against the sshd server with a passwordless public key if its "authorized_keys" is set up as described here ??? and the server is configured with ...., unless SELinux is being enforced on the host.

If SELinux is being enforced, an attempt to authenticate using a passwordless public key generates the following entry in the sshd server log (in debug mode):

Could not open authorized keys '/root/.ssh/authorized_keys': Permission denied

Turning the SELinux in permissive mode will allow the root to log in, but usually this is NOT a good idea.