OpenSSH 3.6.1p2 ON SCO 3.2v4.2 + STRICTMODES -->yes

Vikash Badal - PCS VikashB at ComparexAfrica.co.za
Thu Jul 10 14:24:22 EST 2003



> -----Original Message-----
> From: Paul L. Allen [mailto:paul.l.allen at boeing.com]
> Sent: 09 July 2003 07:11
> To: Vikash Badal - PCS
> Subject: Re: OpenSSH 3.6.1p2 ON SCO 3.2v4.2 + STRICTMODES -->yes
> 
> 
> Vikash Badal - PCS wrote:
> > Greetings,
> > 
> > I have compiled OpenSSH-3.6.1p2 on SCO 3.2v4.2 and
> > the following problem occurs:
> > 
> > I am unable to login as root using when strictmode is set to yes.
> > 
> > output of debug:
> > 
> > Failed none for root from 192.168.1.1 port 1199 ssh2
> > debug1: userauth-request for user root service ssh-connection method
> > publickey
> > debug1: attempt 1 failures 1
> > debug2: input_userauth_request: try method publickey
> > debug1: test whether pkalg/pkblob are acceptable
> > debug1: trying public key file //.ssh/authorized_keys
> > debug3: secure_filename: checking '/.ssh'
> > debug3: secure_filename: checking ''
> > Authentication refused: bad ownership or modes for directory
> > debug1: trying public key file //.ssh/authorized_keys2
> > debug3: secure_filename: checking '/.ssh'
> > debug3: secure_filename: checking ''
> > Authentication refused: bad ownership or modes for directory
> > 
> > It seems that the final check is searching for a 
> non-existant directory,
> > with OpenSSH 3.5p1 this problem does not exist.
> > 
> > Please advise.
> 
> The error you're getting is "bad ownership or modes".  For 
> completeness,
> you should say what the permissions are on root's /.ssh directory and
> on the authorized_keys and authorized_keys2 files inside it.
> 
> Paul Allen
The permissions are :
[root at sco]: / # ls -ld / /.ssh /.ssh/auth*
drwxr-xr-x  19 root     bin          672 Jul 09 09:23 /
drwxr-xr-x   2 root     other        272 Jul 08 10:20 /.ssh
-rw-------   1 root     other       2670 Jul 08 10:20 /.ssh/authorized_keys
-rw-------   1 root     other       4243 Jul 08 10:20 /.ssh/authorized_keys2
[root at sco]: / #

As you can see these perms are okay.



More information about the openssh-unix-dev mailing list