|
From: | Magnus Kelly |
Subject: | [Jailkit-users] Problems with public configuration |
Date: | Thu, 14 Feb 2008 22:44:15 -0000 |
Hello, I have successfully set up jailkit and all works ok until I
try and use public key authentication. What’s not clear is how to configure the users .ssh directory
for the public key certificate? I have ensured the file/dir properties are ok and
can login as a non jailuser with no problems. It’s not clear how to configure the sshd settings in
terms of should the configuration for the jail users certificate location be
done in sshd be in /home/sftproot/etc/ssh/sshd_config OR /etc/ssh/sshd_config ? If we set the /home/sftproot/etc/ssh/sshd_config to allow
public key and install the public key in /home/sftproot/home/magnus/.ssh for
user magnus the server refuses to accept key. In the message log all thats shown is “Feb 14 17:44:09 sftp001
sshd[5498]: Failed publickey for magnus from x.xx.xx.xx port 53313 ssh2 The current settings for /home/sftproot/etc/ssh/sshd_config
is :- Port 1313 Protocol 2 ListenAddress 0.0.0.0 SyslogFacility AUTH LogLevel VERBOSE StrictModes yes LoginGraceTime 30 PermitRootLogin yes HostKey /etc/ssh/ssh_host_rsa_key HostKey /etc/ssh/ssh_host_dsa_key AuthorizedKeysFile %h/.ssh/authorized_keys RhostsRSAAuthentication no IgnoreRhosts yes HostbasedAuthentication no ChallengeResponseAuthentication no PasswordAuthentication no PermitEmptyPasswords no RSAAuthentication no PubkeyAuthentication yes X11Forwarding no PrintMotd no PrintLastLog yes KeepAlive yes UseLogin no Subsystem sftp /usr/libexec/openssh/sftp-server I have checked the FAQ and it is not clear how to
achieve public key authentication for a Jail user. All thoughts welcome Thanks Magnus |
[Prev in Thread] | Current Thread | [Next in Thread] |