Sshd Allow root to Authenticate with Passwordless Public Key
Jump to navigation
Jump to search
Internal
Overview
'root' is allowed to authenticate against the sshd server with a passwordless public key if its "authorized_keys" is set up as described here and the server is configured with ...., unless SELinux is being enforced on the host.
If SELinux is being enforced, an attempt to authenticate using a passwordless public key generates the following entry in the sshd server log (in debug mode):
Could not open authorized keys '/root/.ssh/authorized_keys': Permission denied
Turning the SELinux to permissive mode will allow the root to log in, but disabling SELinux is usually this is not a good idea.