Configuring SystemRescue: `sysconfig` scope

This chapter explains the options available in the sysconfig scope of the YAML config files for System Rescue. See there for details where to place the YAML files and how they are interpreted.


        "[email protected]": "ssh-rsa AAAAB3NzaC1...kQoVPcn3jpgywi/twXcOw=="
        "[email protected]": "no-port-forwarding ssh-rsa ZDWo0UmISKEn...dAq33PUQh"
            title: "SystemRescue"
            url: ""
            title: "Arch Linux Package Search"
            url: ""

        example-ca: |
            -----BEGIN CERTIFICATE-----
            -----END CERTIFICATE-----

    timezone: "Europe/Berlin"

SSH authorized_keys

Allows to configure trusted public keys that are allowed to log in as root user via SSH. These are appended to /root/.ssh/authorized_keys.

This option is structured as a Mapping / dictionary with the “comment” field of the SSH authorized_keys line being the key and the beginning of the entry until the comment being the value. Since the “comment” field is often used to designate the username or email address of the owner, the entries are ordered by these owner names. If the file already contains an entry with the given “comment” it is not added again.

You can use additional options for a key as documented by sshd by prepending them to the keytype. See for example the no-port-forwarding option in the synopsis above.


This option allows to configure bookmarks for the installed Firefox browser. This is implemented via the policies.json file of Firefox.

This option is structured as two levels of Mappings / dictionaries. The key of the first level is used for lexicographic ordering of the entries. Each entry must have a title and url key.

When the policies.json file already contains an entry with a given title, the bookmark will not be added again. Firefox was observed removing entries with duplicate URLs.

Certification Authority (CA) trust

If you maintain one or more local Certification Authorities (CA), you can add them as trust anchors to SystemRescue by listing them in the ca-trust section of the YAML file. You must give each CA an individual name within the ca-trust section. That name will be used as file name within the /etc/ca-certificates/trust-source/anchors/ directory.

The configured CAs will be added to the default trust anchors of System Rescue, which are derived from the CA list used by Mozilla.


Allows to configure the timezone to use. Takes a timezone name as defined in the IANA Time Zone Database which is used by most Linux distributions. Default is “UTC”.