On 17-07-15 13:53, Wilder Rodrigues wrote: > Hi again, > > I just cleaned up the whole KVM host, also removing the .ssh/ dir contents > and deployed a new DC. The private key is not created anymore, only the pub > key: > > [root@kvm1 ~]# ls -lart .ssh/ > total 8 > dr-xr-x---. 4 root root 4096 Jul 17 06:08 .. > drwx------. 2 root root 4096 Jul 17 07:38 . > -rw-r--r--. 1 root root 0 Jul 17 07:38 id_rsa.pub.cloud > [root@kvm1 ~]# ssh -i ~/.ssh/id_rsa.pub.cloud -p 3922 169.254.0.100 > The authenticity of host '[169.254.0.100]:3922 ([169.254.0.100]:3922)' can't > be established. > ECDSA key fingerprint is 81:be:00:fe:37:8d:3f:99:63:1d:e2:ff:3f:4b:56:73. > Are you sure you want to continue connecting (yes/no)? yes > Warning: Permanently added '[169.254.0.100]:3922' (ECDSA) to the list of > known hosts. > @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ > @ WARNING: UNPROTECTED PRIVATE KEY FILE! @ > @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ > Permissions 0644 for '/root/.ssh/id_rsa.pub.cloud' are too open. > It is required that your private key files are NOT accessible by others. > This private key will be ignored. > bad permissions: ignore key: /root/.ssh/id_rsa.pub.cloud > Permission denied (publickey). > [root@kvm1 ~]# > > > Any thoughts? >
No, not really. I do know that my colleague Boris faced the same with deploying from master. Don't know if he actually got it fixed. Wido > Cheers, > Wilder > > > On 17 Jul 2015, at 13:33, Wilder Rodrigues > <wrodrig...@schubergphilis.com<mailto:wrodrig...@schubergphilis.com>> wrote: > > Hi all, > > I’m nt able to use the id_rsa.pub.cloud on KVM hosts. See snippet bellow: > > > [root@kvm1 ~]# ssh -i ~/.ssh/id_rsa.pub.cloud -p 3922 169.254.0.136 > The authenticity of host '[169.254.0.136]:3922 ([169.254.0.136]:3922)' can't > be established. > ECDSA key fingerprint is 81:be:00:fe:37:8d:3f:99:63:1d:e2:ff:3f:4b:56:73. > Are you sure you want to continue connecting (yes/no)? yes > Warning: Permanently added '[169.254.0.136]:3922' (ECDSA) to the list of > known hosts. > @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ > @ WARNING: UNPROTECTED PRIVATE KEY FILE! @ > @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ > Permissions 0644 for '/root/.ssh/id_rsa.pub.cloud' are too open. > It is required that your private key files are NOT accessible by others. > This private key will be ignored. > bad permissions: ignore key: /root/.ssh/id_rsa.pub.cloud > Permission denied (publickey). > [root@kvm1 ~]# chmod 600 /root/.ssh/id_rsa.pub.cloud > [root@kvm1 ~]# ssh -i ~/.ssh/id_rsa.pub.cloud -p 3922 169.254.0.136 > Enter passphrase for key '/root/.ssh/id_rsa.pub.cloud': > Permission denied (publickey). > > It was working fine few days ago. > > The injectkeys.py did not change, although it says 644, but for the private > key. > > print ("Copying new private key file as it is not matching with old file") > shutil.copyfile(newKey, currDir + pathSep + "id_rsa.cloud") > os.chmod(currDir + pathSep + "id_rsa.cloud", 0644) <<<<<<============== I > think we should change it to 600 > > On XenServer, the patch files set the key permission to 600, instead: > > id_rsa.cloud=../../../systemvm,0600,/root/.ssh > > On LibvirtModifySshKeyCommandWrapper it sets the public key to 600 > > final Script script = new Script("chmod", > libvirtComputingResource.getTimeout(), s_logger); > script.add("600", sshprvkeypath); > script.execute(); > > Have you guys seen something like that before? > > Cheers, > Wilder >