Dropbear does not automatically look for it like OpenSSH does. Notice that you need to explicitly specify the identity file on the command line. You should now be able to ssh without a ssh -i ~/.ssh/id_rsa Ensure that permissions on this file are set to 600. Now copy or (concatenate) ‘authorized_keys’ to ~/.ssh on ‘webhost’. Since dropbear stores its keys in different format, it needs to be converted for a standard SSH server:ĭropbearkey -y -f ~/.ssh/id_rsa | grep “^ssh-rsa ” > authorized_keys The goal is to allow ‘nas’ to authenticate to ‘webhost’ using a key instead of a password.įirst, generate your identity key on ‘nas’ This assumes that the OpenWRT device is named ‘nas’ and the remote machine is ‘webhost’. I found plenty of examples on setting up key based authentication using dropbear as the HOST, but not as the CLIENT. In order to rsync files from a remote host using a cron script, this is critical. It turns out that the dropbear ssh client works a bit differently when attempting to use key based authentication. I ran into a little bit of a hiccup getting my OpenWRT NSLU2 device to automatically rsync to a remote host.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |