RetroPie forum home
    • Recent
    • Tags
    • Popular
    • Home
    • Docs
    • Register
    • Login
    Please do not post a support request without first reading and following the advice in https://retropie.org.uk/forum/topic/3/read-this-first

    /boot/config.txt: open for write: permission denied

    Scheduled Pinned Locked Moved Help and Support
    permission
    17 Posts 3 Posters 14.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D
      DrFreeman
      last edited by

      This is the text of my ssh_condig I found with Filezilla

      This is the ssh client system-wide configuration file. See

      ssh_config(5) for more information. This file provides defaults for

      users, and the values can be changed in per-user configuration files

      or on the command line.

      Configuration data is parsed as follows:

      1. command line options

      2. user-specific file

      3. system-wide file

      Any configuration value is only changed the first time it is set.

      Thus, host-specific definitions should be at the beginning of the

      configuration file, and defaults at the end.

      Site-wide defaults for some commonly used options. For a comprehensive

      list of available options, their meanings and defaults, please see the

      ssh_config(5) man page.

      Host *

      ForwardAgent no

      ForwardX11 no

      ForwardX11Trusted yes

      RhostsRSAAuthentication no

      RSAAuthentication yes

      PasswordAuthentication yes

      HostbasedAuthentication no

      GSSAPIAuthentication no

      GSSAPIDelegateCredentials no

      GSSAPIKeyExchange no

      GSSAPITrustDNS no

      BatchMode no

      CheckHostIP yes

      AddressFamily any

      ConnectTimeout 0

      StrictHostKeyChecking ask

      IdentityFile ~/.ssh/identity

      IdentityFile ~/.ssh/id_rsa

      IdentityFile ~/.ssh/id_dsa

      Port 22

      Protocol 2,1

      Cipher 3des

      Ciphers aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc

      MACs hmac-md5,hmac-sha1,umac-64@openssh.com,hmac-ripemd160

      EscapeChar ~

      Tunnel no

      TunnelDevice any:any

      PermitLocalCommand no

      VisualHostKey no

      ProxyCommand ssh -q -W %h:%p gateway.example.com

      RekeyLimit 1G 1h

      SendEnv LANG LC_*
      HashKnownHosts yes
      GSSAPIAuthentication yes
      GSSAPIDelegateCredentials no
      
      1 Reply Last reply Reply Quote 0
      • D
        DrFreeman
        last edited by DrFreeman

        Ah I found the mistake - it is not sshd_config - it is ssh_config.

        But I can not find that line with
        PermitRootLogin without-password

        It is strange because with the sudo su psswd I could change the root passwort successfully?!

        edmaul69E 2 Replies Last reply Reply Quote 0
        • edmaul69E
          edmaul69 @DrFreeman
          last edited by edmaul69

          @DrFreeman you need to do sudopasswd root. But you have to fiollow the guide i posted to enable root password first. Then you need to restart the pi for it to work.

          1 Reply Last reply Reply Quote 0
          • edmaul69E
            edmaul69 @DrFreeman
            last edited by

            @DrFreeman i just tested it. It is /etc/ssh/sshd_config

            1 Reply Last reply Reply Quote 0
            • edmaul69E
              edmaul69 @DrFreeman
              last edited by

              @DrFreeman look at the file name at the top. and you see under authentication you see i have:

              PermitRootLogin yes
              

              alt text

              1 Reply Last reply Reply Quote 0
              • edmaul69E
                edmaul69
                last edited by

                Also if you cant get it working, the /boot folder is accessible on a windows computer so you could manually change the config.txt. But it would be better if you could get root access.

                1 Reply Last reply Reply Quote 0
                • D
                  DrFreeman @edmaul69
                  last edited by

                  @edmaul69 said in /boot/config.txt: open for write: permission denied:

                  Login, and edit this file: sudo nano /etc/ssh/sshd_config

                  Thank you very much but when I do that the file is blank - it seems it does not exist. Please could you tell me the steps? Sorry I am a noob with the pi :(

                  edmaul69E 1 Reply Last reply Reply Quote 0
                  • edmaul69E
                    edmaul69 @DrFreeman
                    last edited by

                    @DrFreeman ssh_config and sshd_config are 2 different files. try adding this to /etc/ssh/sshd_config and then restart your pi. you might need to install some package that is not on your pi.

                    # Package generated configuration file
                    # See the sshd_config(5) manpage for details
                    
                    # What ports, IPs and protocols we listen for
                    Port 22
                    # Use these options to restrict which interfaces/protocols sshd will bind to
                    #ListenAddress ::
                    #ListenAddress 0.0.0.0
                    Protocol 2
                    # HostKeys for protocol version 2
                    HostKey /etc/ssh/ssh_host_rsa_key
                    HostKey /etc/ssh/ssh_host_dsa_key
                    HostKey /etc/ssh/ssh_host_ecdsa_key
                    HostKey /etc/ssh/ssh_host_ed25519_key
                    #Privilege Separation is turned on for security
                    UsePrivilegeSeparation yes
                    
                    # Lifetime and size of ephemeral version 1 server key
                    KeyRegenerationInterval 3600
                    ServerKeyBits 1024
                    
                    # Logging
                    SyslogFacility AUTH
                    LogLevel INFO
                    
                    # Authentication:
                    LoginGraceTime 120
                    PermitRootLogin yes
                    StrictModes yes
                    
                    RSAAuthentication yes
                    PubkeyAuthentication yes
                    #AuthorizedKeysFile	%h/.ssh/authorized_keys
                    
                    # Don't read the user's ~/.rhosts and ~/.shosts files
                    IgnoreRhosts yes
                    # For this to work you will also need host keys in /etc/ssh_known_hosts
                    RhostsRSAAuthentication no
                    # similar for protocol version 2
                    HostbasedAuthentication no
                    # Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication
                    #IgnoreUserKnownHosts yes
                    
                    # To enable empty passwords, change to yes (NOT RECOMMENDED)
                    PermitEmptyPasswords no
                    
                    # Change to yes to enable challenge-response passwords (beware issues with
                    # some PAM modules and threads)
                    ChallengeResponseAuthentication no
                    
                    # Change to no to disable tunnelled clear text passwords
                    #PasswordAuthentication yes
                    
                    # Kerberos options
                    #KerberosAuthentication no
                    #KerberosGetAFSToken no
                    #KerberosOrLocalPasswd yes
                    #KerberosTicketCleanup yes
                    
                    # GSSAPI options
                    #GSSAPIAuthentication no
                    #GSSAPICleanupCredentials yes
                    
                    X11Forwarding yes
                    X11DisplayOffset 10
                    PrintMotd no
                    PrintLastLog yes
                    TCPKeepAlive yes
                    #UseLogin no
                    
                    #MaxStartups 10:30:60
                    #Banner /etc/issue.net
                    
                    # Allow client to pass locale environment variables
                    AcceptEnv LANG LC_*
                    
                    Subsystem sftp /usr/lib/openssh/sftp-server
                    
                    # Set this to 'yes' to enable PAM authentication, account processing,
                    # and session processing. If this is enabled, PAM authentication will
                    # be allowed through the ChallengeResponseAuthentication and
                    # PasswordAuthentication.  Depending on your PAM configuration,
                    # PAM authentication via ChallengeResponseAuthentication may bypass
                    # the setting of "PermitRootLogin without-password".
                    # If you just want the PAM account and session checks to run without
                    # PAM authentication, then enable this but set PasswordAuthentication
                    # and ChallengeResponseAuthentication to 'no'.
                    UsePAM yes
                    
                    1 Reply Last reply Reply Quote 0
                    • D
                      DrFreeman
                      last edited by

                      ok so should I add just a blank file first and just reboot?

                      edmaul69E 1 Reply Last reply Reply Quote 0
                      • edmaul69E
                        edmaul69 @DrFreeman
                        last edited by

                        @DrFreeman put this in the blank file, save then reboot.

                        1 Reply Last reply Reply Quote 0
                        • D
                          DrFreeman
                          last edited by

                          Man, thank you very much and for your patience!!! Really - you made my day :D

                          1 Reply Last reply Reply Quote 1
                          • First post
                            Last post

                          Contributions to the project are always appreciated, so if you would like to support us with a donation you can do so here.

                          Hosting provided by Mythic-Beasts. See the Hosting Information page for more information.