Hi Rob,
1)
I believe that the location where the SSH server looks for keys can be 
configured in /etc in its config fiile.
Is that on a read-only location, too?

2)
Given what you do every day, I think there is some possibility that you are 
going to burn the file system on the remote system yourself.
<g>

If that is the case, create the .ssh folder with 1 or more public keys in it 
before you burn it.
Copy the private key to whatever system(s) you are working from.
Don't use the passwordless option for your private key. <g>

Probably don't try this with a production system, but test systems would be 
fine.


Captain Obvious strikes again!!
<g>





>________________________________
> From: Robert P. J. Day <rpj...@crashcourse.ca>
>To: Ottawa Linux Users Group <linux@lists.oclug.on.ca> 
>Sent: Tuesday, March 19, 2013 4:43:21 PM
>Subject: [OCLUG-Tech] how to set up "passwordless" ssh login?
> 
>
>  before i start digging through the docs for something subtle that i
>missed, i want to make sure i understand the recipe for setting up
>passwordless ssh login, and what it *requires* to be possible on both
>ends. (i think i already know the answer to this, i just want to be
>absolutely sure.)
>
>  so, i'm on system A, and i know an account and its password on
>system B -- that part is kind of essential to start with. with that
>alone, i can of course:
>
>  $ ssh nameb@systemb
>
>but i will be prompted for the password -- ssh is very particular
>about that.  so far, so good, right?
>
>  now i want to extend this so i don't have to type in the password
>every time.  AFAIK, this involves being able to do the following:
>
>1) on system A, i need to run "ssh-keygen" to generate my own pair of
>keys
>
>2) i need to then run "ssh-copy-id" to copy my *public* key to the
>remote system, into the home directory of the target account --
>specifically, into ~/.ssh/authorized_keys
>
>  again, all of this is pretty standard but here's where i run into
>trouble. turns out that the target system is a small embedded linux
>system where there is only one account -- root -- which has its home
>directory in a read-only filesystem. as best i know, i'm pretty well
>screwed here, right?
>
>  for the above to work, the home directory of the target account
>*must* be writable in order for me to stash my public key in
>~/.ssh/authorized_keys, correct? if even the remote account can't
>write into its own home directory, i don't see how to get around that.
>thoughts?
>
>  a couple other questions while i'm here. again, i think this is
>pretty obvious but if a whole bunch of different accounts want to
>passwordless ssh into the same remote account, each one of them has to
>run the recipe above, yes? so the remote account better be prepared to
>stash a lot of public keys in .ssh.
>
>  finally, if i'm unable to change the configuration of the remote
>system, the only option i see that's completely client side-based is
>"sshpass":
>
>  http://linux.die.net/man/1/sshpass
>
>am i missing anything? given the read-only nature of the target
>system, i don't see any easy workaround.
>
>rday
>
>-- 
>
>========================================================================
>Robert P. J. Day                                 Ottawa, Ontario, CANADA
>                        http://crashcourse.ca
>
>Twitter:                                      http://twitter.com/rpjday
>LinkedIn:                              http://ca.linkedin.com/in/rpjday
>========================================================================
>_______________________________________________
>Linux mailing list
>Linux@lists.oclug.on.ca
>http://oclug.on.ca/mailman/listinfo/linux
>
>
>
_______________________________________________
Linux mailing list
Linux@lists.oclug.on.ca
http://oclug.on.ca/mailman/listinfo/linux

Reply via email to