-
Notifications
You must be signed in to change notification settings - Fork 404
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bad authorized_keys
is not reported in non-debug mode
#247
Comments
It should print a message with the filename Line 606 in a1cf9d5
Checking here:
|
Right, I checked again now. It does not warn for non-existent authorized_keys. Please consider if this warrants a warning, because I infer from I am otherwise fine with this. Thank you for looking into it. |
The problem is that it would print a warning for every user who is just logging in with a password, who doesn't have an authorized_keys file. |
But if |
It is for a non-root dropbear, sorry for not clarifying earlier. The context is my unprivileged container use case described here, so a single-user server + clients who run apps in the same sandbox and the same UID as the server. |
On Debian,
-v
is not available (no idea if that's deliberate or just an oversight) so, in case of an issue withauthorized_keys
, you only getExit before auth from <...>: (user 'michael', 0 fails): Exited normally
without a clue.Digging in the source code, in checkpubkey() in
svr-authpubkey.c
, the fatal error due to a bad authorized_keys file (line 463) is on a more serious note than theenter checkpubkey
above. What about logging it always (not only in verbose mode) and maybe triggeringdropbear_exit()
? Orcheckpubkeyperms()
insvr-authpubkey.c
might log a precise message.The text was updated successfully, but these errors were encountered: