bugzilla-daemon at mindrot.org
2021-Sep-17 22:18 UTC
[Bug 3347] New: Option to override file permission restrictions
https://bugzilla.mindrot.org/show_bug.cgi?id=3347
Bug ID: 3347
Summary: Option to override file permission restrictions
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
Assignee: unassigned-bugs at mindrot.org
Reporter: macdjord at gmail.com
`ssh` enforces that certain files have restricted access permissions -
e.g. that `.ssh/config` not be writeable by anyone but the user, and
that private key files not be writable or readable - or else the file
will be ignored. This is a good security practice, and makes sense as
the default. However, there are times when it is *not* possible to
satisfy these requirements, and for such situations there needs to be
an option to override or bypass these restrictions when that happens.
For example, my own use case: I have a Linux VM which has some
directories mapped in from the Windows host machine. Since the Windows
file system doesn't support Unix-style file permissions, everything in
these mounted directories appears permanently world-writable, which
makes it *impossible* to use any SSH key or config files inside there.
--
You are receiving this mail because:
You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2021-Sep-17 22:19 UTC
[Bug 3347] Option to override file permission restrictions
https://bugzilla.mindrot.org/show_bug.cgi?id=3347
Jordan Macdonald <macdjord at gmail.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |macdjord at gmail.com
--
You are receiving this mail because:
You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2022-Sep-13 21:40 UTC
[Bug 3347] Option to override file permission restrictions
https://bugzilla.mindrot.org/show_bug.cgi?id=3347
Will B <will.brokenbourgh2877 at gmail.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |will.brokenbourgh2877 at gmail
| |.com
--- Comment #1 from Will B <will.brokenbourgh2877 at gmail.com> ---
I would also like to request this. I understand the implications on
Unix-like systems, but for Windows this is a major time-waster. It
took about 15 minutes too long to do a simple scp using an id file on
Windows. I had to find and implement the Windows file security
settings that would be acceptable to OpenSSH -- for *one* file -- then
actually get on with the task of performing the scp.
Maybe to some this is a minor thing, but when time is money, and
Microsoft is using your project, this should definitely be either
bypassed or a setting provided. Without cygwin or msys, you cannot
simply issue chmod 600 * on Windows and everything is then okay.
Thanks! :-)
--
You are receiving this mail because:
You are watching the assignee of the bug.