On Fri, Oct 27, 2000 at 07:38:36AM +0200, Robert Waldner wrote:
> Of yourse, the sshd processs has to be able to read the files, so ~, ~/
>  .ssh and ~/.ssh/authorized_keys have to accessible for world.
> 
> A "chmod goa+r ~/.ssh" should do the trick, someone correct me if I´m 
>  wrong.

wrong, first just to nitpick the a+ in chmod includes g and o, so goa+
is redundant.

second sshd runs as root so world read is NOT required for RSA/DSA to
work properly (caveat, i use OpenSSH 1.whatever from potato):

[EMAIL PROTECTED] eb]$ ls -ld ~
drwxr-x---   49 eb       users        4096 Oct 26 23:32 /home/eb
[EMAIL PROTECTED] eb]$ ls -ld .ssh/
d--x------    2 eb       eb           4096 Oct 11 22:33 .ssh/
[EMAIL PROTECTED] eb]$ ls -ld .ssh/authorized_keys
-r--------    1 eb       eb           1777 Oct 11 22:23 .ssh/authorized_keys
[EMAIL PROTECTED] eb]$

ssh works quite fine here.

what ssh is worried about is group or world write permission anywhere
in the path to ~/.ssh/authorized_keys.  which oddly enough did not
appear to be the case from the original post.  only thing i can think
of is /home itself had bogus permissions, but i doubt it since debian
leaves this 2775 in the base install...  

-- 
Ethan Benson
http://www.alaska.net/~erbenson/

Attachment: pgp9ZpKpYHOBN.pgp
Description: PGP signature

Reply via email to