Uhhhh...  that sounds like a very, very bad idea to me.  That'll let anyone
read my .ssh/identity, which is bad.  Quoting from man ssh:

       $HOME/.ssh/identity
              Contains the RSA authentication identity of the user.  This
file contains sensitive data and
              should  be  readable  by the user but not accessible by
others.

The permisions on /root are 777, on /root/.ssh are 755, and on each of the
files in /root/.ssh are 600, all of which I believe matches the
recommendations in ssh(1).

Besides, doing a "chmod -R 755 *" would mark _all_ the files in /root as
executable, which is wrong.

As for which is better...  That may be a matter of preference, but here's
why I'd prefer to use ssh:  Don't have to type a long, complicated password
every time, automatically sets a nice DISPLAY env variable for me, totally
secure.  More functionality + easier + secure = better in my book.

-----Original Message-----
From: Jan B. Koum [mailto:[EMAIL PROTECTED]]
Sent: Saturday, May 08, 1999 18:56
To: Cimarron Ryan; [EMAIL PROTECTED]
Subject: Re: ssh -l root



        That means that either /root or /root/.ssh directories have odd
file permissions. Either they are non-readable or world readable or
something. Do as root:  "chmod -R 755 /root"
        And see if that helps (that will make /root and everything below
that directory including .ssh mode 755)

        Actually, IMHO it might be best to ssh in as user and then su(1) ;)

-- Yan

Reply via email to