Mailinglist Archive: opensuse (3349 mails)

< Previous Next >
Re: [SLE] Root password corrupt?
  • From: Ken Schneider <suse-list@xxxxxxxxxxxxx>
  • Date: Mon, 30 May 2005 08:25:34 -0400
  • Message-id: <1117455934.24103.7.camel@xxxxxxxxxxxxxxxxx>
On Mon, 2005-05-30 at 10:14 +0200, Jonas Helgi Palsson wrote:
> And then if you have problems with the password while using ssh, you
> could
> make ssh-keys to log in with:
>
> as root on your box:
>
> marvin:~ # ssh-keygen -t dsa
> Generating public/private dsa key pair.
> Enter file in which to save the key (/root/.ssh/id_dsa):
> Enter passphrase (empty for no passphrase):
> Enter same passphrase again:
> Your identification has been saved in /root/.ssh/id_dsa.
> Your public key has been saved in /root/.ssh/id_dsa.pub.
> The key fingerprint is:
> 09:37:6f:ba:d5:ab:8f:14:2f:c0:4a:2d:98:89:7e:24 root@marvin
> marvin:~ #
>
> then copy the file /root/.ssh/id_dsa.pub to the other machine and
> store it as
> ~/.ssh/authorized_keys

If the file already exists then append it with cat id_dsa.pub >>
authorized_keys otherwise you will loose any existing keys.

>
> (where ~ represents your homecatalog)
>
>
> Then you should be able to log in as root without giving any
> password.
> Note that I did not specify a passphrase. That is _not_ a good
> security
> practice...

--
Ken Schneider
UNIX since 1989, linux since 1994, SuSE since 1998

"The day Microsoft makes something that doesn't suck is probably
the day they start making vacuum cleaners." -Ernst Jan Plugge


< Previous Next >