From: Peter van Hooft on
On 2010-07-29, oparr(a)hotmail.com <oparr(a)hotmail.com> wrote:
>>it would be a real
>>easy matter to get into someone else's home directory, fiddle with the
>>authorized_keys file
>
> Not if the permissions on $HOME/.ssh and $HOME/.ssh/authorized_keys
> are 700 and 600 respectively which they should be and are in my case.
> I think this is an overreaction on the part of ssh default settings.
> Whatever, it would have been nice if this was documented. Not even 775
> on $HOME is allowed.
>
>
That's because 775 on $HOME would allow anyone in your unix group to
take over your identity:
mv $HOME/.ssh $HOME/.ssh-old
mkdir $HOME/.ssh

etc.


peter

From: Sami Ketola on
oparr(a)hotmail.com <oparr(a)hotmail.com> wrote:
> Not if the permissions on $HOME/.ssh and $HOME/.ssh/authorized_keys
> are 700 and 600 respectively which they should be and are in my case.
> I think this is an overreaction on the part of ssh default settings.
> Whatever, it would have been nice if this was documented. Not even 775
> on $HOME is allowed.

It is docummended. But you are not asking yourself the right question here.
You should ask yourself is that why on earth you want to give everyone
that much access to your home directory. In general it's not a good idea.

Sami
From: oparr on
> You should ask yourself is that why on earth you want to give everyone
> that much access to your home directory.

Better question....Why the hell ssh's debug option couldn't indicate
what was wrong?


On Jul 29, 12:09 pm, Sami Ketola <Sami.Ket...(a)iki.finland.invalid>
wrote:
>
From: Peter van Hooft on
On 2010-07-30, oparr(a)hotmail.com <oparr(a)hotmail.com> wrote:
>> You should ask yourself is that why on earth you want to give everyone
>> that much access to your home directory.
>
> Better question....Why the hell ssh's debug option couldn't indicate
> what was wrong?
Because it doesn't receive the necessary info from the server for
security reasons. The sshd indicates what is wrong when given the
-d option. What I do is starting sshd -d -D on another port
than 22 in a terminal and then try to connect to it. In this
way the normal ssh operations aren't disturbed.

peter
From: oparr on
> Because it doesn't receive the necessary info from the server for
> security reasons.

Long story short....There is a flaw in how the default StrictModes
setting operates. Testing the permissions on $HOME/.ssh is all that is
required.

Requiring group write for an individual account on an application
account's home directory should not require that you lose all the
benefits of the default StrictModes setting.

On Jul 30, 3:58 am, Peter van Hooft <p...(a)xs4all.nl> wrote:
>