#getenforce
#setenforce 0
~/.ssh
directory and its contents are proper. When I first set up my ssh key auth, I didn't have the ~/.ssh
folder properly set up, and it yelled at me.~
and your ~/.ssh
directory on the remote machine must be writable only by you: rwx------
and rwxr-xr-x
are fine, but rwxrwx---
is no good, even if you are the only user in your group (if you prefer numeric modes: 700
or 755
, not 775
).rw-------
, i.e. 600
.~/.ssh/authorized_keys
file (on the remote machine) must be readable (at least 400), but you'll need it to be also writable (600) if you will add any more keys to it.restorecon -R -v ~/.ssh
(see e.g.Ubuntu bug 965663 and Debian bug report #658675; this is patched in CentOS 6).A server SHOULD return a response with this status code if a request included a Range request-header field, and none of the range-specifier values in this field overlap the current extent of the selected resource, and the request did not include an If-Range request-header field. (For byte-ranges, this means that the first-byte-pos of all of the byte-range-spec values were greater than the current length of the selected resource.) When this status code is returned for a byte-range request, the response SHOULD include a Content-Range entity-header field specifying the current length of the selected resource (see section 14.16). This response MUST NOT use the multipart/byteranges content-type.
/etc/ssl/certs
), or may include an entire certificate chain including public key, private key, and root certificates. The name is from Privacy Enhanced Email, a failed method for secure email but the container format it used lives on./etc/ssl/private
. The rights on this directory and the certificates is very important, and some programs will refuse to load these certificates if they are set wrong.