Re: [Puppet-dev] Re: (puppetlabs/puppet) New pull request: (#8986) Don't su when creating SSH authorized_keys

2011-09-05 Thread Trevor Vaughan
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 That's exactly what I was looking for! Thanks for the patch. Trevor On 09/05/2011 09:56 PM, Kelsey Hightower wrote: > Right now the way the patch works is that root will create the file > and chown it to what ever user is specified when using the >

[Puppet-dev] Re: (puppetlabs/puppet) New pull request: (#8986) Don't su when creating SSH authorized_keys

2011-09-05 Thread Kelsey Hightower
Right now the way the patch works is that root will create the file and chown it to what ever user is specified when using the ssh_authorized_key type. If you want the key to be owned by root, just specify root as the user. -- You received this message because you are subscribed to the Google Gro

Re: [Puppet-dev] Re: (puppetlabs/puppet) New pull request: (#8986) Don't su when creating SSH authorized_keys

2011-09-01 Thread Trevor Vaughan
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Isn't it wonderful when you sound like a complete idiot on a public forum? So, lesson #1 is to not post before the morning caffeine. That said, I just re-tested this on Fedora 15 and SSH doesn't care if the authorized_keys file is owned by the user

Re: [Puppet-dev] Re: (puppetlabs/puppet) New pull request: (#8986) Don't su when creating SSH authorized_keys

2011-09-01 Thread Trevor Vaughan
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ssh_authorized_keys can be owned by anyone. Think of how git works. The file is owned by git/gitosis/whatever, but you log in as yourself. This is the whole point of ssh_authorized_keys and one way that it can be abused. In my tests, SSH doesn't car

[Puppet-dev] Re: (puppetlabs/puppet) New pull request: (#8986) Don't su when creating SSH authorized_keys

2011-08-30 Thread Kelsey Hightower
One use case where it may not be desirable to have users own the keys is in centralized ssh key setups backed by LDAP and PAM authentication. In this specific case all keys are stored in a central location such as /etc/ssh-public-keys/*.pub. The keys are only read by PAM (root) during the authentic

[Puppet-dev] Re: (puppetlabs/puppet) New pull request: (#8986) Don't su when creating SSH authorized_keys

2011-08-29 Thread Kelsey Hightower
> I have not taken the time to look, in detail, at this yet, but we > should consider at least the greater scope of changes that were made > in that commit before we absorb this. > > Daniel Yeah, I should have searched the repo for previous commits, good catch. -- You received this message becau