On Tue, Jul 28, 2015 at 3:10 PM, Robert Wolfe <robert.wo...@malco.com> wrote:
> -----Original Message-----
> From: centos-boun...@centos.org [mailto:centos-boun...@centos.org] On Behalf 
> Of Chris Murphy
> Sent: Tuesday, July 28, 2015 3:46 PM
> To: CentOS mailing list
> Subject: Re: [CentOS] Fedora change that will probably affect RHEL
>
> [...]
>
> What you said:
>
> "Windows Server has power shell disabled by default. The functional 
> equivalent, sshd, is typically enabled on Linux servers. So I think it's 
> overdue that sshd be disabled on Linux servers by default, especially because 
> the minimum password quality under discussion is still not good enough for 
> forward facing servers on the Internet with static IPv4 addresses. They will 
> get owned eventually if they use even the new minimum pw quality, and that's 
> why I see pw quality as the wrong emphasis - at least for workstations."
>
> And my reply:
>
> For things like SSH and RDP I use two-factor authentication using DUO.  For 
> the machines that I absolutely have to have these kinds of access two (my BBS 
> for RDP and my mail server for SSH), this works well I think at providing an 
> extra layer of security for both protocols and is quite affordable and is 
> easy to administer.

OK but imagine making that the default, and how many workflows that
don't need that level of authentication will be bothered in one form
or another: a.) change workflow b.) learn how to revert the behavior.

It's one thing to disable sshd by default because pretty much everyone
familiar with a particular distribution will be familiar with
console/OOB enabling of sshd, or eventually being used to initially
accessing a web interface to enable such a service.

-- 
Chris Murphy
_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to