Difference between revisions of "Application:OpenSSH"

From WebOS Internals
Jump to navigation Jump to search
Line 18: Line 18:
  
 
to move the public key to become the /home/root/.ssh/authorized_keys file.
 
to move the public key to become the /home/root/.ssh/authorized_keys file.
 
If you should not already have done it, you will need to setup a password for root, as OpenSSH will otherwise refuse the connection with the error message "The server refused our key". You can change the root password with
 
 
rootfs_open -w
 
passwd root
 
''Changing password for root''
 
''New password:'' yourlocalprepasswordhere
 
''Retype password:'' yourlocalprepasswordhere
 
''Password for root changed by root''
 
 
where the ''italic text'' is the shell output you will see. Please keep in mind that this password is the local password on the Pre only, ie it has nothing to do with the passphrase that you will use to login with your secret key via OpenSSH on your Pre.
 
  
 
Now the secret key needs to be transferred to the workstation you want to log into the Pre. First copy the secret key to the accessible area with
 
Now the secret key needs to be transferred to the workstation you want to log into the Pre. First copy the secret key to the accessible area with

Revision as of 15:05, 9 January 2010

OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on.

Please refer to the OpenSSH Home Page and read the OpenSSH Manual Pages before using this package.

If you are connecting to your webOS device from a Windows host computer, please read the Secure Linux/UNIX access with PuTTY and OpenSSH Tech Tip and follow those instructions for generating your SSH keys. For the section "Install public key on Linux system", you will need to put the "Public Key for pasting into OpenSSH authorized_keys file" into a /home/root/.ssh/authorized_keys file.

Optware installs openssh under /opt, so you should replace any references to /bin, /sbin, and /etc in the OpenSSH documentation with /opt/bin, /opt/sbin and /opt/etc respectively.

If you are not able to follow the Secure Linux/UNIX access with PuTTY and OpenSSH Tech Tip to generate your SSH keys, you can use the Terminal application to create your secure SSH keys for use with OpenSSH directly on your webOS device. Your public ssh key needs to be stored in /home/root/.ssh/authorized_keys to be read by OpenSSH to allow root login via ssh keys.

You can use:

/opt/bin/ssh-keygen

to create the private and public keys, and then:

mv /home/root/.ssh/id_rsa.pub /home/root/.ssh/authorized_keys

to move the public key to become the /home/root/.ssh/authorized_keys file.

Now the secret key needs to be transferred to the workstation you want to log into the Pre. First copy the secret key to the accessible area with

cp /home/root/.ssh/id_rsa /media/internal/id_rsa

Tap on the USB symbol at the bottom of the Pre screen and choose 'USB Device' in order to access the media. Move the secret key to your workstation and follow the terminal software's instructions on how to make this new secret key known to the terminal.