Skip to content
This repository has been archived by the owner on Nov 8, 2021. It is now read-only.

Changes required to work under CentOS 6 #144

Open
ab77 opened this issue Jan 15, 2019 · 4 comments
Open

Changes required to work under CentOS 6 #144

ab77 opened this issue Jan 15, 2019 · 4 comments

Comments

@ab77
Copy link

ab77 commented Jan 15, 2019

Metadata:

  • Operating System: CentOS 6
  • Installation method: install.sh script
  • AWS CLI Version: latest

We have a legacy dependency on CentOS 6, so to make this system work under v6, the following changes are required:

  • install_configure_selinux.sh script commented out (no NIS boolean in v6)
  • sed -i'' 's/AuthorizedKeysCommandUser/AuthorizedKeysCommandRunAs/g' /etc/ssh/sshd_config

Tested, OK. Happy to submit a PR if this is of interest to anyone.

@michaelwittig
Copy link
Contributor

michaelwittig commented Jan 16, 2019

Have you seen #132 ?

@ab77
Copy link
Author

ab77 commented Jan 16, 2019

I have now :)

Not quite sure why there is all that extra stuff added to install_configure_selinux.sh, it works just as well without it.

I would also just be doing a simple version check in install_configure_sshd.sh and based on the test, use either AuthorizedKeysCommandUser or AuthorizedKeysCommandRunAs directive.

Do you want me to submit this in a PR?

@michaelwittig
Copy link
Contributor

if you like you can create a PR. But keep in mind that I expect that this project will be replaced by AWS SSM Session Manager in the near future. AWS is working on a very similar implementation using the AuthorizedKeysCommand

@ab77
Copy link
Author

ab77 commented Jan 17, 2019

Interesting. However unless you can do SSH tunneling with session manager, the original approach will still be relevant.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants