On Sun, Dec 25, 2011 at 3:44 AM, Werner Flamme <werner.fla...@ufz.de> wrote:
> Am 25.12.2011 04:37, schrieb Aurelin:
>
>>> I have this even without using rssh, so it may not be related. This
>>> occurs when ~/.ssh and its contents have wrong owners or rights, or
>>> when the shell profiles have wrong owner/rights, or whenever sshd
>>> thinks something is wrong. At least the latter is my guess...
>> This is a possibility. You may not have some of the files with 777
>> permissions in ~/.ssh/, and I _think_ it's the same for the directory.
>> Can't tell it by heart now. It's also true that a wrong owner will make
>> ssh go failing.
>
> There is no file with 777 permissions in .ssh. I am not mad, you know?
> ;-) The rights of the directory itself, and most of its content, must be
> 0600. Only the public keys should be world readable. And everything must
> belong to the right owner.

This is incorrect. flatly incorrect.

The typical permissions are:

$HOME/.     0700 (or possibly 0775, tastes vary and other settings can
work, write permission is *optional*)
$HOME/.ssh  0700 (or possibly 0750, again, tastes can vary and other
settings in between can work, write permission is *optional*)
     "others" should not have access to this
$HOME/.ssh/authorized_keys     0600 (or possibly 0400, tastes vary)
    *No one else*, either group members or "other", should have access
to this file.

Private keys can be stored however the heck you want them. SSH clients
*do not care*, and they can be anywhere you want with whatever
permissions you want, including $HOME/.ssh/privatekey with permissions
7777 if you feel like it.

> There is no problem with that.  But why doesn't sshd tell me in its log
> the reason for closing the connection? Why do I have to resort to "ssh
> -vvv" to discover it?

Because some sone of a !@#$ can overwhelm your SSH log files with
failed connections if it's too verbose, and the balance between useful
information and log spew is a tricky one.

Sorry if I seem a bit cranky about this, I've been dealing with SSH
for a long time, and I get a bit touchy when errors get posted as "it
has to be this way".

>>> For me, when I try to authenticate via key, there is no chance to
>>> enter a password if the key is wrong ("Server refused public key"). I
>>> tried to debug with "ssh -vvv ...", and found the wrong owner of
>>> ~/.bash_profile, but still have a problem with another user.
>>>
>> When you've got the wrong key, ssh will fail. It could be that, if you
>> have 4 keys in your file and only the 4th is ok, ssh will fail to. There
>> is a setting in sshd_conf (I suppose it's there) that tells the server
>> how any times he shall try. If it's told to try 3 times, it will fail
>> after figuring out that the first 3 keys used by the client are wrong,
>> _even though the user had a password that would match_!
>> Check this setting and change it or rearrange the order of the keys or
>> unload them, if this thing is the case.
>
> I give one key. And I allow logon via password. I know from older
> versions of ssh, that the password was asked after thze key failed. At
> least with the RH 6 servers, this is not the case any more.
>
>>
>> I had this problem when I had a user a wanting to log in as user b on a
>> server. When user a connected to the server as b, the server said "Wrong
>> public key" because the first 3 keys didn't match (since they were for
>> different connections..).
>
> In my user a's ~./.ssh/config, there is exactly one key per server. And
> this key is used.
>
>> It is the same with ESX where I had the problem that ESX found out I was
>> using Private/Public-Key login in general.
>> It then failed when I tried to log in via ILO, because I had 3 keys
>> loaded and none of them was ok (obviously.. I never have a root-key for
>> ILO-login..)
>>   Solution was to unload all keys (which made it possible to login with a
>> password).
>
> Another possibility is to use a ~./.ssh/config with correct definitions ;-)

And this is a very useful approach indeed, especially if you have
multiple SSH access to one server. (One key for backups, one key for
shell access is useful.)

> And please don't PM me as a response to a list posting. Thank you.
>
> Best Regards,
> Werner

You too, and have a good holiday.

------------------------------------------------------------------------------
Write once. Port to many.
Get the SDK and tools to simplify cross-platform app development. Create 
new or port existing apps to sell to consumers worldwide. Explore the 
Intel AppUpSM program developer opportunity. appdeveloper.intel.com/join
http://p.sf.net/sfu/intel-appdev
_______________________________________________
rssh-discuss mailing list
rssh-discuss@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/rssh-discuss

Reply via email to