scp no password copy as root
Vram
lamsokvr at xprt.net
Wed Nov 9 05:27:10 UTC 2005
I guess I am confused..
Why do you need to copy files as root..
This is a BAD practice..
Vram
On Wed, 2005-11-09 at 16:14 +1100, Steven Heimann wrote:
> Vram
>
> Thanks for your interest. I should have thought to include the config
> file. I think it is back to unchanges from the default.
>
> Steven
>
>
> # Package generated configuration file
> # See the sshd(8) manpage for details
>
> # What ports, IPs and protocols we listen for
> Port 22
> # Use these options to restrict which interfaces/protocols sshd will
> bind to
> #ListenAddress ::
> #ListenAddress 0.0.0.0
> Protocol 2
> # HostKeys for protocol version 2
> HostKey /etc/ssh/ssh_host_rsa_key
> HostKey /etc/ssh/ssh_host_dsa_key
> #Privilege Separation is turned on for security
> UsePrivilegeSeparation yes
>
> # Lifetime and size of ephemeral version 1 server key
> KeyRegenerationInterval 3600
> ServerKeyBits 768
>
> # Logging
> SyslogFacility AUTH
> LogLevel INFO
>
> # Authentication:
> LoginGraceTime 120
> PermitRootLogin yes
> StrictModes yes
>
> RSAAuthentication yes
> PubkeyAuthentication yes
> AuthorizedKeysFile %h/.ssh/authorized_keys
>
> # Don't read the user's ~/.rhosts and ~/.shosts files
> IgnoreRhosts yes
> # For this to work you will also need host keys in /etc/ssh_known_hosts
> RhostsRSAAuthentication no
> # similar for protocol version 2
> HostbasedAuthentication no
> # Uncomment if you don't trust ~/.ssh/known_hosts for
> RhostsRSAAuthentication
> #IgnoreUserKnownHosts yes
>
> # To enable empty passwords, change to yes (NOT RECOMMENDED)
> PermitEmptyPasswords no
>
> # Change to yes to enable challenge-response passwords (beware issues
> with
> # some PAM modules and threads)
> ChallengeResponseAuthentication no
>
> # Change to no to disable tunnelled clear text passwords
> #PasswordAuthentication yes
>
>
> # To change Kerberos options
> #KerberosAuthentication no
> #KerberosOrLocalPasswd yes
> #AFSTokenPassing no
> #KerberosTicketCleanup no
>
> # Kerberos TGT Passing does only work with the AFS kaserver
> #KerberosTgtPassing yes
>
> X11Forwarding yes
> X11DisplayOffset 10
> PrintMotd no
> PrintLastLog yes
> KeepAlive yes
> #UseLogin no
>
> #MaxStartups 10:30:60
> #Banner /etc/issue.net
>
> # Allow client to pass locale environment variables
> AcceptEnv LANG LC_*
>
> Subsystem sftp /usr/lib/openssh/sftp-server
>
> UsePAM yes
>
>
> On Tue, 2005-11-08 at 20:03 -0800, Vram wrote:
> > On Wed, 2005-11-09 at 14:46 +1100, Steven Heimann wrote:
> > > I am trying to perform a passwordless scp from one computer to my
> > > desktop which is running Ubuntu 5.10.
> > >
> > > I have performed the usual key generation and copied it to my desktop.
> > > I am sure the keys were generated without a password. The system works
> > > fine as an ordinary user but I can't get it to work as root.
> > >
> > > I have tried :
> > >
> > > 1. creating a root password on the desktop. I can perform the copy once
> > > the password is supplied even thogh there is definitely a passwordless
> > > entry authorized_keys.
> > >
> > > 2. changing PermitRootLogin from yes to without-password. This results
> > > in the password still being asked for but not accepted.
> > >
> > > 3. putting a copy of authosized_keys in authorized_keys2
> > >
> > > 4. making a copy in /home/root/.ssh (just in case it might work)
> > >
> > > What could be stopping me doing the root copy? ( I need to do it as
> > > root as this is backing up a database server with files owned by a
> > > number of different users and some files are read only)
> > >
> > > Thank you
> > > Steven
> > >
> > >
> >
> >
> >
> > What does /etc/ssh/sshd_config say??
> >
> >
> > Vram
> >
> >
> >
> >
More information about the ubuntu-users
mailing list