Vocore SuperNub First aid kit
  1. servercat@charon ~ $ ssh-keygen -t rsa
  2. Generating public/private rsa key pair.
  3. Enter file in which to save the key (/home/servercat/.ssh/id_rsa):
  4. Created directory '/home/servercat/.ssh'.
  5. Enter passphrase (empty for no passphrase):
  6. Enter same passphrase again:
  7. Your identification has been saved in /home/servercat/.ssh/id_rsa.
    Your public key has been saved in /home/servercat/.ssh/id_rsa.pub.
    The key fingerprint is:
    SHA256:xxxxxxxxxxxxxx+xxxxxxx/xxxxxxxxxxxxxxxxxxxx servercat@charon
    The key's randomart image is:
    +---[RSA 2048]----+
    | x x |
    | x x xx |
    | xxxxxx |
    | xxxxxxxxxx |
    | xxxxxxxxxx |
    | xxxxxxxxx |
    | xxxxxxxxx |
    | xxxxxx |
    | xxxxxxx|
  8. servercat@charon ~ $ ssh root@ mkdir -p .ssh
  9. The authenticity of host ' (' can't be established.
    RSA key fingerprint is SHA256:t8pQamgwjQkVGK2a3UYDpovH0sjyK8jtPMaYmLbf1iw.
    Are you sure you want to continue connecting (yes/no)? yes
    Warning: Permanently added '' (RSA) to the list of known hosts.
  10. root@'s password:
  11. servercat@charon ~ $ cat .ssh/id_rsa.pub | ssh root@ 'cat >> .ssh/authorized_keys'
  12. root@'s password:
  13. no luck here, opĂȘnwrt needs different place for the public key file, as explained in THIS SECTION
    So it needed something like
    loging to the vocore as you should know by now how to, as do i, when you do you are positioned /root dir,
  14. root@OpenWrt:~# cd .ssh
  15. root@OpenWrt:~/.ssh# ls
  16. authorized_keys
  17. root@OpenWrt:~/.ssh# cp authorized_keys /etc/dropbear/authorized_keys
  18. i dont know if a reboot is necessary but since i needed to logout to check it wont hurt anyway
  19. root@OpenWrt:~/.ssh# reboot
  20. wait until done and
  21. servercat@charon ~ $ ssh root@
  22. gets me to the church on time logged in, no password asked, now to test with a script