Timeline for SELinux preventing ssh via public key
Current License: CC BY-SA 3.0
5 events
| when toggle format | what | by | license | comment | |
|---|---|---|---|---|---|
| Feb 17, 2024 at 21:35 | comment | added | Andrew G Morgan |
This info was what I needed, but I'm wondering why this isn't some sort of default? Do all users have to have this restorecon command executed for them? Or is there some way to configure the system to allow it for all users? Is the access for anything more than the specific ~/.ssh/authorized_keys file actually needed?
|
|
| Jun 23, 2020 at 3:25 | history | bounty awarded | Criggie | ||
| Jun 19, 2020 at 2:16 | comment | added | Criggie | Thank you - this occurred for me on an AWS host where I relocated /home from the root disk to a separate disk mounted at /home. All resolved now. | |
| Feb 6, 2019 at 5:47 | vote | accept | Colton | ||
| Jun 13, 2014 at 5:39 | history | answered | dartonw | CC BY-SA 3.0 |