This is
u=rwx,go=rx so a
daemon can access e. g.
~/.ssh/authorized_keys (see
ssh(1) to learn about its significance). Permissions must be granted along the
whole pathname traversal. Of course, a
better – not best – solution would
u=rwx,go= and use Access Control Lists to furnish the rights.
I’m afraid not. I suppose the idea is that “it works” without
mandating that you were some kind of FreeBSD guru already.
Hi Kai! I do not understand. My home directory on FreeBSD 15 is now 700. I just created an SSH keypair on my Fedora 43 laptop using ssh-keygen, then copied the newly created public key to FreeBSD15 ~/.ssh/authorized_keys. I was able to login using public key with this command:
ssh
kalevi@fbsd15.local -i /home/untosten/.ssh/id_ed25519
Using "truss -p 82586 -f -o foo", I verified that the SSH daemon does this:
root@fbsd15:~ # grep authorized foo
52964: fstatat(AT_FDCWD,"/home/kalevi/.ssh/authorized_keys",{ mode=-rw-r--r-- ,inode=42500,size=108,blksize=4096 },AT_SYMLINK_NOFOLLOW) = 0 (0x0)
52964: openat(AT_FDCWD,"/home/kalevi/.ssh/authorized_keys",O_RDONLY|O_NONBLOCK,00) = 8 (0x8)
52964: __realpathat(AT_FDCWD,"/home/kalevi/.ssh/authorized_keys","/home/kalevi/.ssh/authorized_keys",1024,0) = 0 (0x0)
52964: fstatat(AT_FDCWD,"/home/kalevi/.ssh/authorized_keys",{ mode=-rw-r--r-- ,inode=42500,size=108,blksize=4096 },AT_SYMLINK_NOFOLLOW) = 0 (0x0)
52964: openat(AT_FDCWD,"/home/kalevi/.ssh/authorized_keys",O_RDONLY|O_NONBLOCK,00) = 8 (0x8)
52964: __realpathat(AT_FDCWD,"/home/kalevi/.ssh/authorized_keys","/home/kalevi/.ssh/authorized_keys",1024,0) = 0 (0x0)
So I am wondering what is the real rationale behind the 755 permissions.