From: oparr on
Why is this type of authentication sensitive to permissions on the
remote user's home directory? Case in point.....Had it working fine
until someone came along and changed the permissions on the remote
user's home directory from rwxr-xr-x to rwxrwxrwt. Are ssh home
directory permissions requirements documented somewhere?
From: chuckers on
On Jul 29, 2:32 am, "op...(a)hotmail.com" <op...(a)hotmail.com> wrote:
> Why is this type of authentication sensitive to permissions on the
> remote user's home directory? Case in point.....Had it working fine
> until someone came along and changed the permissions on the remote
> user's home directory from rwxr-xr-x to rwxrwxrwt. Are ssh home
> directory permissions requirements documented somewhere?

They are picky because with more open permissions, it would be a real
easy matter to get into someone else's home directory, fiddle with the
authorized_keys file and have full access things they probably
shouldn't.
The whole point of public key access is to make sure the person coming
in
is who they say they are and only allow people on the list in.

OpenSSH has an option to turn off strict checking with StrictMode no
in the sshd_config file:

http://www.openssh.com/faq.html#3.14

Not sure if that option exists in the Solaris version of SSH or not.
I don't think it is a good idea either way.
From: oparr on
On Jul 28, 7:15 pm, chuckers <chucker...(a)gmail.com> wrote:
> On Jul 29, 2:32 am, "op...(a)hotmail.com" <op...(a)hotmail.com> wrote:
>
> > Why is this type of authentication sensitive to permissions on the
> > remote user's home directory? Case in point.....Had it working fine
> > until someone came along and changed the permissions on the remote
> > user's home directory from rwxr-xr-x to rwxrwxrwt. Are ssh home
> > directory permissions requirements documented somewhere?
>
> They are picky because with more open permissions, it would be a real
> easy matter to get into someone else's home directory, fiddle with the
> authorized_keys file and have full access things they probably
> shouldn't.
> The whole point of public key access is to make sure the person coming
> in
> is who they say they are and only allow people on the list in.
>
> OpenSSH has an option to turn off strict checking with StrictMode no
> in the sshd_config file:
>
> http://www.openssh.com/faq.html#3.14
>
> Not sure if that option exists in the Solaris version of SSH or not.
> I don't think it is a good idea either way.

From: oparr on
>it would be a real
>easy matter to get into someone else's home directory, fiddle with the
>authorized_keys file

Not if the permissions on $HOME/.ssh and $HOME/.ssh/authorized_keys
are 700 and 600 respectively which they should be and are in my case.
I think this is an overreaction on the part of ssh default settings.
Whatever, it would have been nice if this was documented. Not even 775
on $HOME is allowed.


On Jul 28, 7:15 pm, chuckers <chucker...(a)gmail.com> wrote:
>
From: John D Groenveld on
In article <c9815241-793a-4819-bffa-198efeda799c(a)o10g2000prf.googlegroups.com>,
chuckers <chuckersjp(a)gmail.com> wrote:
>Not sure if that option exists in the Solaris version of SSH or not.
>I don't think it is a good idea either way.

See StrictModes in sshd_config(4).

John
groenveld(a)acm.org