On 14 Aug 2024, at 10:29, Matthias Apitz wrote:
>
> The above page gives as an example entry in the file /etc/pam.d/sudo the
> following line:
>
> "auth sufficient pam_ssh_agent_auth.so file=~/.ssh/authorized_keys"
>
> perhaps to be inserted without the apostrophes.
>
> The actual file is:
>
El día lunes, agosto 12, 2024 a las 01:50:53 +0100, Andrew Gallagher escribió:
> Sorry, it’s pam-ssh-agent-auth:
>
> https://linux.die.net/man/8/pam_ssh_agent_auth
The above page gives as an example entry in the file /etc/pam.d/sudo the
following line:
"auth sufficient pam_ssh_agent_auth.so fil
El día lunes, agosto 12, 2024 a las 06:13:43p. m. +0200, Werner Koch via
Gnupg-users escribió:
> On Mon, 12 Aug 2024 14:26, Matthias Apitz said:
>
> > password-store and for outbound SSH/SCP. Is there a way, for example
> > with a config in /etc/pam.d/ to used the OpenPGP card for providing
On Mon, 12 Aug 2024 14:26, Matthias Apitz said:
> password-store and for outbound SSH/SCP. Is there a way, for example
> with a config in /etc/pam.d/ to used the OpenPGP card for providing
> the password to 'sudo ' or 'sudo -s'
I thought these days everyone is using
ssh root@localhost
Sorry, it’s pam-ssh-agent-auth:
https://linux.die.net/man/8/pam_ssh_agent_auth
A
> On 12 Aug 2024, at 13:48, Andrew Gallagher wrote:
>
> You can use pam-auth-ssh-agent with gpg’s ssh-agent emulation. Thisnhas the
> advantage that it also works over remote ssh connections (with ssh agent
> f
You can use pam-auth-ssh-agent with gpg’s ssh-agent emulation. Thisnhas the
advantage that it also works over remote ssh connections (with ssh agent
forwarding enabled).
Andrew Gallagher
> On 12 Aug 2024, at 13:27, Matthias Apitz wrote:
>
>
> I use in my Linux Debian mobile L5 an internal O