From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) by finch.gentoo.org (Postfix) with ESMTP id F381213877A for ; Mon, 7 Jul 2014 00:40:49 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id DCD2CE0870; Mon, 7 Jul 2014 00:40:44 +0000 (UTC) Received: from mail-ig0-f178.google.com (mail-ig0-f178.google.com [209.85.213.178]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id CEF39E0863 for ; Mon, 7 Jul 2014 00:40:43 +0000 (UTC) Received: by mail-ig0-f178.google.com with SMTP id hn18so3817163igb.11 for ; Sun, 06 Jul 2014 17:40:43 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=zJi4GyiXGeFBl26nxUc5Taub/15mU3ALzl2rixOgW3o=; b=iMJowNW4AJ3MB3O5zCfzyrkK61oNiC5Pf2b6XC1bGxPnc7yjOOEgeFQ+5dhz0txLMv iyEvtxohjalhSCxiR2r8ZcAqwBlF96oBUyKbQvOuJhVRX9WUYOKuUkWcZZc/elMQeMQ0 eInjZxUd9n8yvuJjmBAVu9i4kJGxEgFIX0E6IYFWVaoLJlT5SC0WwIei+79dNfK8Act8 rZ07uRvvqeitoeA3utZZ15hZwc+MaMtuoLrRR+rN9EkpFu6G3HIuwBcmbN+BL1YIfrJK BFM+tMNZHvSFU/pzsyPqdh/WWCKMkGu/wOaOvxBDg9o3H5/UK8ozKVPLEHMQ5muWLLQD EiVg== Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-user@lists.gentoo.org Reply-to: gentoo-user@lists.gentoo.org MIME-Version: 1.0 X-Received: by 10.42.224.71 with SMTP id in7mr28684527icb.59.1404693643188; Sun, 06 Jul 2014 17:40:43 -0700 (PDT) Received: by 10.42.115.201 with HTTP; Sun, 6 Jul 2014 17:40:43 -0700 (PDT) In-Reply-To: <53B9B279.2070509@gmail.com> References: <53B9B279.2070509@gmail.com> Date: Sun, 6 Jul 2014 17:40:43 -0700 Message-ID: Subject: Re: [gentoo-user] How does ssh know to use "pinentry"? From: Chris Stankevitz To: "gentoo-user@lists.gentoo.org" Content-Type: text/plain; charset=UTF-8 X-Archives-Salt: 3525bef9-765f-4ea9-85be-4de25808dbb6 X-Archives-Hash: 1d2ff4947176ef9747b6bacf274cf4ec On Sun, Jul 6, 2014 at 1:32 PM, Alan McKinnon wrote: > Why not do the obvious thing instead? > > Run keychain and have it unlock your keys *once* when the workstation > boots up. ssh then always uses that key as it is unlocked. Alan, Thank you. FYI, I do not have a problem typing my password 100 times per day. The only problem I have with "pinentry" is that it doesn't let me paste. Does keychain allow me to paste? If so, I'll consider it. However, now that I have killed pinentry from my system I am happily pasting my passphrase into the ssh console. On another note, from my OP, I am still curious how the ssh software knows to use /usr/bin/pinentry to fetch my passphrase. In a follow-up post, I discovered that this mechanism only works if an environment variable called GPG_AGENT_INFO is set. I doubt the ssh source code contains the string "/usr/bin/pinentry" or "GPG_AGENT_INFO". Chris