On Fri, May 09, 2014 at 03:42:52PM -0700, Greg Bailey wrote: > I think you're missing: > > chmod 600 ~dan/.ssh/authorized_keys > > Without it, sshd won't use the authorized_keys file if it's readable by > other users. (I think that's related to "StrictMode"; consult sshd man > page) No. Public keys are public and are happy to be readable. What can _not_ be allowed is group/world writeable... ANYWHERE in the path. eg if ~dan is /home then / must be owned by root and permission 755 /home must be owned by root and permission 755 /home/dan must be owned by dan and not be group/world writeable /home/dan/.ssh must be owned by dan and not be group/world writeable /home/dan/.ssh/authorized_keys must be owned by dan and not be group/world writeable Also permissions of /etc /etc/ssh /etc/ssh/sshd_config and so on. -- rgds Stephen