On Fri, Oct 12, 2012 at 8:56 AM, RĂ¼diger Kupper <k...@kg-fds.de> wrote:
> That's the way we are doing it. For this to work, you need to install
> the ssh server in the client chroot, set up a root account und list
> root's ssh fingerprint in the authorized-keys file.

Here are some helpful bits for accomplishing the above:

# Generate ssh keys for client management
ssh-keygen -q -N "" -f /root/.ssh/id_rsa

# Copy those keys to the client chroot
chmod 600 /root/.ssh/id_rsa.pub
mkdir -m 700 /opt/ltsp/$ARCH/root/.ssh/
cp /root/.ssh/id_rsa.pub /opt/ltsp/$ARCH/root/.ssh/authorized_keys

# Suppress meaningless host key messages in ssh client
# Note that this does not reduce security when connecting to thin
clients, but could compromise
# security when connecting to other ssh servers, as it defeats host key checking
echo "StrictHostKeyChecking no" >> /etc/ssh/ssh_config
echo "UserKnownHostsFile=/dev/null" >> /etc/ssh/ssh_config

db

------------------------------------------------------------------------------
Don't let slow site performance ruin your business. Deploy New Relic APM
Deploy New Relic app performance management and know exactly
what is happening inside your Ruby, Python, PHP, Java, and .NET app
Try New Relic at no cost today and get our sweet Data Nerd shirt too!
http://p.sf.net/sfu/newrelic-dev2dev
_____________________________________________________________________
Ltsp-discuss mailing list.   To un-subscribe, or change prefs, goto:
      https://lists.sourceforge.net/lists/listinfo/ltsp-discuss
For additional LTSP help,   try #ltsp channel on irc.freenode.net

Reply via email to