[BlueOnyx:14034] Re: key-based auth for ssh user?

Brian M toomanyhandles at gmail.com
Fri Nov 15 16:32:32 -05 2013


Hi Michael-

I think I'm running into some issue specific to BOnyx permissions.  I have
this working on other distros.   Key placed in the authorized_keys file is
rsa 2048

I am hesitant to change some of the perms on this dir tree as it will
affect actual vsite accesses.

thanks for thoughts!

Brian.
-----------------------------------
Nov 15 15:33:17 www sshd[13150]: Authentication refused: bad ownership or
modes for directory /home/.sites/106/site3/.users/14/theuser

drwxr-xr-x  14 root root  4096 Nov 15 15:27 home

drwxrwxr-x  6 root  root    4096 Feb  6  2010 .sites

drwxrwxr-x  3 root  root  4096 Feb  6  2010 106

drwxrwsr-x 7 nobody site3 4096 Feb  7  2010 site3

drwxr-sr-x 4 root       site3  4096 Nov  7 13:51 .users

drwxr-sr-x 3 root   site3 4096 Nov 15 15:28 14

drwxrws--x 6 theuser site3 4096 Nov 15 15:30 theuser

drwx------ 2 theuser site3 4096 Nov 15 15:30 .ssh

-rw------- 1 theuser site3  381 Nov 15 15:30 authorized_keys



On Thu, Nov 7, 2013 at 5:17 PM, Michael Stauber <mstauber at blueonyx.it>wrote:

> Hi Brian,
>
> > I have a need for to add key-based auth for one user.
> >
> > I have edited /etc/ssh/sshd-config and enabled pubkey auth and the path
> for
> > the keyfile.
> >
> > if I create the user via useradd -m their directory gets created in /home
> > but adding a key to the keyfile I specified does not allow access.
>
> That's one way to do it, but it's neither necessary to edit the SSHd
> config, nor should you create users manually with the "useradd" command.
>
> If you manually add users with "useradd", then the users will not show
> up in the GUI and they cannot be CMU-migrated either.
>
> All you need to do for key based SSH authentication is this:
>
> Create the user in question via the GUI. Enable shell access for the
> user. Login by SSH as that user.
>
> Now create an SSH key for that user by running this command as that user
> from SSH:
>
> ssh-keygen -t rsa
>
> It'll ask a few questions. Simply press return on any question to accept
> the defaults. This will create a 2048 bit private and public SSH key
> (without password) for that user in ~username/.ssh/
>
> Next create the file ~username/.ssh/authorized_keys and into that paste
> the SSH public key that this user is using to SSH into the box.
>
> If he's logging in from another Linux box, then that's his
> ~username/.ssh/id_rsa.pub on that other Linux box, provided the key was
> also generated there with "ssh-keygen -t rsa" and standard parameters.
>
> That public key will look roughly like this, although the part in the
> middle is a lot longer:
>
> ssh-rsa [Lots-of-weird-text] username at workstation.home
>
> Save the changes.
>
> Once that's one this user can login by SSH using key based
> authentication. If his SSH session sends the key that's stored in
> ~username/.ssh/authorized_keys, he will be allowed to log in.
>
> If no key is sent (or the key doesn't match), he'll be asked for the
> account password instead.
>
> That's all there is to do.
>
> --
> With best regards
>
> Michael Stauber
> _______________________________________________
> Blueonyx mailing list
> Blueonyx at mail.blueonyx.it
> http://mail.blueonyx.it/mailman/listinfo/blueonyx
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.blueonyx.it/pipermail/blueonyx/attachments/20131115/b6e6845e/attachment.html>


More information about the Blueonyx mailing list