[gp6admin@mdw ~]$ ssh mdw gp6admin@mdw's password:
- You can test ssh with -vvv option for very verbose output (this cluster is using gp6admin user which is ok)
mdw$ ssh -vvv mdw (...) debug1: Offering RSA public key: /home/gp6admin/.ssh/id_rsa debug3: send_pubkey_test debug3: send packet: type 50 debug2: we sent a publickey packet, wait for reply debug3: receive packet: type 51
expected output
debug1: Offering RSA public key: /home/gpadmin/.ssh/id_rsa debug3: send_pubkey_test debug3: send packet: type 50 debug2: we sent a publickey packet, wait for reply debug3: receive packet: type 60
- checking further on /var/log/secure we see the problem at the time when we try to ssh
tail -f /var/log/secure Apr 22 21:37:38 mdw sshd[197631]: reprocess config line 48: Deprecated option RSAAuthentication Apr 22 21:37:38 mdw sshd[197631]: reprocess config line 53: Deprecated option RhostsRSAAuthentication Apr 22 21:37:38 mdw sshd[197631]: Authentication refused: bad ownership or modes for directory /home/gp6admin
- when checking home permissions we see the difference
drwx------. 33 gpadmin gpadmin 12K Apr 22 07:30 gpadmin drwxrwxr-x 16 gp6admin gp6admin 4.0K Apr 22 21:34 gp6admin
- changed the permission to default 700
[root@mdw home]# chmod 700 gp6admin/ [root@mdw home]# ls -latrh | grep admin drwx------. 33 gpadmin gpadmin 12K Apr 22 07:30 gpadmin drwx------ 16 gp6admin gp6admin 4.0K Apr 22 21:34 gp6admin
- and now the ssh is working without password