On Thu, Jan 27, 2011 at 2:35 AM, Cameron Kerr <came...@humbledown.org> wrote:
>
> On 27/01/2011, at 7:45 PM, Always Learning wrote:
>
>> Hallo,
>>
>> I wanted to avoid typing-in my password every occasion I remotely
>> logged-on to a server.
>>
>> I created my SSH keys and copied the public part to the server and
>> renamed it authorized_keys.
>
>
>> ---------------------------------------------
>>
>> server /root/.ssh
>>
>> id_rsa.authorized_keys  -rw--------
>>
>> --------------------------------------------
>
> Your ~/.ssh/authorized_keys needs to be readable by sshd, your permissions on 
> it are too restrictive (typically, this should be 0644)

No, 0600 is *fine* In fact that is the recommended permission from the
man page for "ssh". OpenSSH does a bit of UID and EUID manipulation to
gain permissions to examine that file as the user whose login is being
attempted, precisely to deal with NFS mounted home directories which
do not allow "root" direct access to protected files.
_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to