Public bug reported: The required permissions are now too strict. It is not possible to login using the PublicKey method if the home directory is group readable.
WHAT I DID Install openssh-server and openssh-client. Create a new account. Login to the account and create a PublicKey ssh-keygen -t rsa Copy the PublicKey to the authorized keys list cat ~/.ssh/id_rsa.pub > .ssh/authorized_keys Set the permissions along the path chmod u+rwx,go-rwx ~/ chmod u+rwx,go-rwx ~/.ssh chmod u+rw,go-rwx ~/.ssh/authorized_keys Start the ssh authentication agent, and add the new key eval `/usr/bin/ssh-agent -s` ssh-add Login to the account via ssh ssh -vv localhost Logout. WHAT HAPPENS Everything works as expected WHAT I DID NEXT Change the permission on just the home folder. chmod g+rwx ~/ Login to the account via ssh ssh -vv localhost WHAT I EXPECTED Login should still work. It does in jaunty, and the FILES section of the ssh man page makes no mention of restrictions on the home directory. In fact, it talks about permissions on .ssh, which makes no sense if the home directory is already more restricted. WHAT HAPPENS PublicKey authentication fails. The reason is given in /var/log/authlog as the wrong permissions on the home directory. ** Affects: openssh (Ubuntu) Importance: Undecided Status: New -- PublicKey authentication fails because of onerous permission rules https://bugs.launchpad.net/bugs/522373 You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openssh in ubuntu. -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs