Date: Mon, 10 Sep 2001 19:15:52 +0100 From: David Taylor <davidt@yadt.co.uk> To: Adam Laurie <adam@algroup.co.uk> Cc: Freebsd-security@FreeBSD.ORG Subject: Re: allow selective RSA AUTH in sshd setup? Message-ID: <20010910191552.A61465@gattaca.yadt.co.uk> In-Reply-To: <3B9D00D0.C522C41A@algroup.co.uk>; from adam@algroup.co.uk on Mon, Sep 10, 2001 at 19:05:04 %2B0100 References: <001c01c1385e$d8e43400$f0f2a118@tampabay.rr.com> <Pine.BSF.4.10.10109101235200.46378-100000@federation.addy.com> <20010910180239.B59628@area51.dk> <3B9CF42B.FDBF942A@algroup.co.uk> <20010910181527.C59628@area51.dk> <3B9D00D0.C522C41A@algroup.co.uk>
index | next in thread | previous in thread | raw e-mail
On Mon, 10 Sep 2001, Adam Laurie wrote:
> > If you really want to verify all changes to users authorized_keys file,
> > change the ownership so users can't modify the file but still read it.
>
> and how would you do that without blocking their entire home directory
> then? :)
>
Easy enough
# mkdir ~user/.ssh
# touch ~user/.ssh/{authorized_keys,config,random,etc,etc,etc}
# chown root:usersprivategroup ~user/.ssh
# chmod 750 ~user/.ssh
# chown user:usersprivategroup ~user/.ssh/*
# chmod 640 ~user/.ssh/*
# chown root:usersprivategroup ~user/.ssh/authorized_keys
SSH even seems happy to have a root-owned authorized_keys file...
--
David Taylor
davidt@yadt.co.uk
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
help
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010910191552.A61465>
