If pw less access is something you prefer use a kerberos based service like 
FreeIPA/RedhatIPA.  No need for ssh keys, and pw aren't stored locally.  You 
can log in as a regular user and sudo su - to root, which can be done during 
ssh login:  ssh -t user@host sudo su - 

David 

On Jan 27, 2011, at 1:35 AM, Cameron Kerr <came...@humbledown.org> wrote:

> 
> On 27/01/2011, at 7:45 PM, Always Learning wrote:
> 
>> Hallo,
>> 
>> I wanted to avoid typing-in my password every occasion I remotely
>> logged-on to a server.
>> 
>> I created my SSH keys and copied the public part to the server and
>> renamed it authorized_keys.
> 
> 
>> ---------------------------------------------
>> 
>> server /root/.ssh
>> 
>> id_rsa.authorized_keys  -rw--------
>> 
>> --------------------------------------------
> 
> Your ~/.ssh/authorized_keys needs to be readable by sshd, your permissions on 
> it are too restrictive (typically, this should be 0644)
> 
> Also, it should be named authorized_keys, not id_rsa.authorized_keys
> 
> PS. Coming from a background in other distributions, I find it disturbing 
> that Centos ships with allow_root_login defaulting to yes. If you really need 
> this, ensure that you also restrict access from where people can log in, 
> consider employing dynamic banning, and harden your sshd_config (which, oddly 
> enough, you didn't post).
> 
> PPS. When diagnosing such faults, it can be useful to run the sshd (ie. the 
> server process) in debugging mode, although this would generally require the 
> server to be temporarily disabled so it can be started in debugging mode.
> _______________________________________________
> CentOS mailing list
> CentOS@centos.org
> http://lists.centos.org/mailman/listinfo/centos
_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to