diff options
author | Baitinq <manuelpalenzuelamerino@gmail.com> | 2022-09-23 01:47:03 +0200 |
---|---|---|
committer | Baitinq <manuelpalenzuelamerino@gmail.com> | 2022-09-23 12:30:09 +0200 |
commit | d9ac4e8802aa0fe1f8cc1b32e4683d72efedf7a7 (patch) | |
tree | e5c4e40a57a6a9f2c909a6df37d0c9123b98246e | |
parent | Misc: Encrypt flake.lock (diff) | |
download | nixos-config-d9ac4e8802aa0fe1f8cc1b32e4683d72efedf7a7.tar.gz nixos-config-d9ac4e8802aa0fe1f8cc1b32e4683d72efedf7a7.tar.bz2 nixos-config-d9ac4e8802aa0fe1f8cc1b32e4683d72efedf7a7.zip |
SSH: Add own authorized_keys
-rw-r--r-- | hosts/configuration.nix | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/hosts/configuration.nix b/hosts/configuration.nix index 63a78c4..f8d6437 100644 --- a/hosts/configuration.nix +++ b/hosts/configuration.nix @@ -60,6 +60,9 @@ isNormalUser = true; extraGroups = [ "wheel" "audio" "video" ]; # Enable ‘sudo’ for the user. hashedPassword = secrets.baitinq.hashed_password; + openssh.authorizedKeys.keys = [ + "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAID99gQ/AgXhgwAjs+opsRXMbWpXFRT2aqAOUbN3DsrhQ (none)" + ]; }; environment.variables = { @@ -129,6 +132,9 @@ services = { openssh = { enable = true; + /* DOESNT WORK BECAUSE OF AUTHORIZEDKEYS BUG + passwordAuthentication = false; + kbdInteractiveAuthentication = false;*/ listenAddresses = [{ addr = "0.0.0.0"; port = 2222; |