-
-
Notifications
You must be signed in to change notification settings - Fork 46
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
sshd support #5
Comments
RE: authentication, could we just put this in our init script: if [ ! -f /home/root/.ssh/authorized_keys ]; then
sed s/root:.:/root:xGVw8H4GqkKg6:/ /etc/shadow > /tmp/shadow
chmod 400 /tmp/shadow
mount --bind /tmp/shadow /etc/shadow
fi i.e. if authorized_keys does not exist, set the root password to |
That makes sense. If we put that shadowfile somewhere persistent ( Update: just realized this (persistence) is not a great idea, in case someone does a software update, as we don't have any guarantees regarding |
Initial dropbear integration is finished in 957d29f - UI is working, Fully static builds seemed to fail to link when built with meta-lg-webos-ndk - not sure how to go about this, I don't have much practice with general subject of crosscompilation. |
Fully static build may not work - IIRC the NDK I built doen't come with any archive files. Thus no way to static link with libc. But I think if crypto libraries could be statically linked, then it's good enough. |
We are currently only supporting unauthenticated telnet-based remote access. We should prefer some safer solution by default - like SSH.
/media/developer
?)/etc/shadow
to set some default root password for a user (yet) - can we make dropbear accept unauthenticated users unlessauthorized_keys
has been populated?ares-install
and other SDK toolsThe text was updated successfully, but these errors were encountered: