> > > The only way I can think of is to pre-create an .ssh directory, and chown > > > it to root with no write permissions. > > > > Doesn't work; since the user has rwx permission in their home directory, > > they can just delete anything below it. > > Create a file in .ssh owned by root with owner write only. Change the > owner of .ssh to root and set it owner write only. Now the user cannot > delete the directory. They might not be able to delete it, but they can still re-name it.
- Re: Restricting RSA Authentication. dreamwvr
- Re: Restricting RSA Authentication. Stephen Carville
- Re: Restricting RSA Authentication. Reagan Blundell
- Re: Restricting RSA Authentication. dreamwvr
- Re: Restricting RSA Authentication. Kevin Sullivan
- Re: Restricting RSA Authentication. David Pick
- Re: Restricting RSA Authentication. Carlos Carvalho
- Re: Restricting RSA Authentication. Shiloh Costa
- Re: Restricting RSA Authentication. Dan Astoorian
- Re: Restricting RSA Authentication. Greg A. Woods
- Re: Restricting RSA Authentication. Randolph J. Herber
- Re: Restricting RSA Authentication. dreamwvr
- Re: Restricting RSA Authentication. Randolph J. Herber
