← Back to context

Comment by marginalia_nu

2 years ago

Getting a password does not require modifying the system. Injecting a public key does.

The password needs to be generated somehow, right? Assuming you don't you use a pre-baked password that repeats across machines, you could replace the password generation and retrieval with deploying a public key instead.

The remote system must generate its own SSH private key; you could use that opportunity to deploy the authorized keys before sealing the system as read-only.