991 bytes added
, 21:59, 29 June 2017
* To remote Login to a System with ecryptfs Home and SSH Public Key Auth do:
* Create .ssh folder in /home for the keys to be stored
<pre>
$sudo mkdir /home/.ssh
</pre>
* move existing authorized_keys file into .ssh dir as username
<pre>
$sudo mv ~/.ssh/authorized_keys /home/.ssh/username
$sudo chmod 600 /home/.ssh/username
</pre>
*c reate symbolic link to authorized_keys file in user .ssh
<pre>
$ln -s /home/.ssh/username ~/.ssh/authorized_keys
</pre>
*update sshd config file to set the new path for the authorized_keys file
<pre>
$sudo nano /etc/ssh/sshd_config
</pre>
* change the AuthorizedKeysFile line to:
<pre>
AuthorizedKeysFile /home/.ssh/%u
</pre>
* change User Profile to auto mount ecryptfs-home
<pre>
$sudo nano ~/.profile
</pre>
* add these lines at the Top Line 3-5:
<pre>
ecryptfs-mount-private
cd /home/username
</pre>
* reboot
<pre>
$sudo reboot
</pre>
* Test the remote SSH Login to the System the Home must now be unlocked and mounted as /home/Username/.Private