hey listers! silly quesion: if I generate an RSA key on an NFS shared home directory, then cat >> it into the .ssh/authorized_keys file in the same location, shouldn't I then be able to ssh into each host that shares the NFS home directory without entering a passphrase (assuming the key doesn't have one)? and assuming the permissions on the authorized_keys file belong to the user with mode 600? thanks! tim -- Here's my RSA Public key: gpg --keyserver pgp.mit.edu --recv-keys 5A4873A9 Share and enjoy!!
On 10/22/2010 11:38 AM, Tim Dunphy wrote:> silly quesion: if I generate an RSA key on an NFS shared home > directory, then cat>> it into the .ssh/authorized_keys file in the > same location, shouldn't I then be able to ssh into each host that > shares the NFS home directory without entering a passphrase (assuming > the key doesn't have one)? and assuming the permissions on the > authorized_keys file belong to the user with mode 600?The permissions on the .ssh directory must also be correct. Otherwise, yes.
At Fri, 22 Oct 2010 14:38:37 -0400 CentOS mailing list <centos at centos.org> wrote:> > hey listers! > > silly quesion: if I generate an RSA key on an NFS shared home > directory, then cat >> it into the .ssh/authorized_keys file in the > same location, shouldn't I then be able to ssh into each host that > shares the NFS home directory without entering a passphrase (assuming > the key doesn't have one)? and assuming the permissions on the > authorized_keys file belong to the user with mode 600?Yes. This works quite well.> > thanks! > tim >-- Robert Heller -- 978-544-6933 / heller at deepsoft.com Deepwoods Software -- http://www.deepsoft.com/ () ascii ribbon campaign -- against html e-mail /\ www.asciiribbon.org -- against proprietary attachments