1 |
On Wednesday 13 Jul 2016 09:48:59 Peter Humphrey wrote: |
2 |
> On Tuesday 12 July 2016 17:48:33 Alan McKinnon wrote: |
3 |
> > On 12/07/2016 17:42, Peter Humphrey wrote: |
4 |
> > > Is there a guide to setting up password-less authentication to enable me |
5 |
> > > to do this? |
6 |
> > |
7 |
> > http://www.funtoo.org/Keychain |
8 |
> |
9 |
> Thanks Alan. I don't think it's the one I read before but it looks useful |
10 |
> anyway. |
11 |
> |
12 |
> > Note that you, portage and root are 3 different users, so you must make |
13 |
> > key pairs for each on each source machine you will ssh from. |
14 |
> > |
15 |
> > Then you need to add each of those user's public keys to each |
16 |
> > destination user's authorized_keys file on each machine you want to ssh |
17 |
> > to. |
18 |
> > |
19 |
> > That can be a lot of key copying :-) 3 x 3 x # of machines |
20 |
> > |
21 |
> > Finally, on each machine you will ssh from and as each user who will do |
22 |
> > the ssh'ing, you must run keychain at least once to store the key creds. |
23 |
> > They should then persist until reboot, when you must run keychain again |
24 |
> > for each user. |
25 |
> |
26 |
> Hmm. I may end up just allowing ssh password authentication and relying on |
27 |
> my vDSL router to keep other people's noses out of my business. The portage |
28 |
> user can't log in anyway, so its scp-ing and rsyncing would have to be done |
29 |
> by root. |
30 |
> |
31 |
> > The idea is that a given user's keychain creds are valid over all that |
32 |
> > user's login sessions on a machine. Users cannot share each other's |
33 |
> > keychain |
34 |
> |
35 |
> You've given me plenty to think about - thanks again. |
36 |
|
37 |
Something else to think about is to only allow the login shell to execute |
38 |
limited command(s), for example to only be able to su to portage and run rsync |
39 |
or some such. |
40 |
-- |
41 |
Regards, |
42 |
Mick |