sshd1 had an directive called 'Strict Modes'. When set to no it would not check things 
like file permissions and ownerships. This used to be necessary for running sshd1 on 
certain systems (AIX 4.3 for example) that had / owned by bin:bin or something other 
than what sshd1 expected. If you are running sshd1 and cannot change your directory 
permissions then set this to no (in $ETCDIR/sshd_config). If you are running sshd2 I 
have yet to discover how this issue has been addressed

Regards,
Todd

On Wed, Feb 10, 1999 at 12:43:02PM -0500, George McConnell wrote:
> At 08:58 AM 2/10/99 , you said something like....
> 
> >is there an option to disable the permission check for the target users
> >$HOME directory?
> >
> >What I want to do is to login with RSA-Authentication as root where root's
> >homedir is / with the following permissions:
> >
> >     drwxrwxr-x  26 root     sys         1024 Feb 10 10:12 /
> 
> >Feb 10 12:59:01 sshd[13573]: log: Rsa authentication refused for root: bad
> >modes for /
> 
> the $HOME directory should be not be world writable.
> 
> also, check the permissions on the ssh directory ($HOME/.ssh). the 
> permissions on the directory should be 700.
> 
> the files inside the directory should be:
> 
> -rw-r--r--   1 user   sysadmin    3142 Jan 29 19:18 authorized_keys
> -rw-------   1 user   sysadmin     383 Jan 29 11:05 config
> -rw-------   1 user   sysadmin     547 Jan 20 15:18 key
> -rw-r--r--   1 user   sysadmin     351 Jan 20 15:18 key.pub
> -rw-r--r--   1 user   sysadmin    6222 Feb  9 10:22 known_hosts
> -rw-------   1 user   sysadmin     512 Feb  9 10:22 random_seed

-- 
Todd Fleisher
[EMAIL PROTECTED]
http://www.fleish.org/fleish

Reply via email to