sshd1 had an directive called 'Strict Modes'. When set to no it would not check things
like file permissions and ownerships. This used to be necessary for running sshd1 on
certain systems (AIX 4.3 for example) that had / owned by bin:bin or something other
than what sshd1 expected. If you are running sshd1 and cannot change your directory
permissions then set this to no (in $ETCDIR/sshd_config). If you are running sshd2 I
have yet to discover how this issue has been addressed
Regards,
Todd
On Wed, Feb 10, 1999 at 12:43:02PM -0500, George McConnell wrote:
> At 08:58 AM 2/10/99 , you said something like....
>
> >is there an option to disable the permission check for the target users
> >$HOME directory?
> >
> >What I want to do is to login with RSA-Authentication as root where root's
> >homedir is / with the following permissions:
> >
> > drwxrwxr-x 26 root sys 1024 Feb 10 10:12 /
>
> >Feb 10 12:59:01 sshd[13573]: log: Rsa authentication refused for root: bad
> >modes for /
>
> the $HOME directory should be not be world writable.
>
> also, check the permissions on the ssh directory ($HOME/.ssh). the
> permissions on the directory should be 700.
>
> the files inside the directory should be:
>
> -rw-r--r-- 1 user sysadmin 3142 Jan 29 19:18 authorized_keys
> -rw------- 1 user sysadmin 383 Jan 29 11:05 config
> -rw------- 1 user sysadmin 547 Jan 20 15:18 key
> -rw-r--r-- 1 user sysadmin 351 Jan 20 15:18 key.pub
> -rw-r--r-- 1 user sysadmin 6222 Feb 9 10:22 known_hosts
> -rw------- 1 user sysadmin 512 Feb 9 10:22 random_seed
--
Todd Fleisher
[EMAIL PROTECTED]
http://www.fleish.org/fleish