On 01/28/2014 03:57 AM, Brian wrote:
> On Mon 27 Jan 2014 at 20:24:42 -0800, Jon Danniken wrote:
> 
>> I recently came across a posting by an individual who got his
>> Debian machine compromised due to a number of security problems, one of
>> which was the default installation and running of sshd with
>> "PermitRootLogin =
>> Yes".  in /etc/ssh/sshd_config.
> 
> These types of posts are not unusual; what they all generally have in
> common is a lack of detail and any evidence that "PermitRootLogin = Yes"
> in itself is the cause. Having introduced a FUD factor it is now easier
> to promote alternatives without having to justify them.
> 
>> So I checked the Debian installation that I put on my laptop a month ago
>> (from the Wheezy net install CD), and sure enough I had the same
>> vulnerability
> 
> "PermitRootLogin = Yes" is upstream's (and Debian's) default setting; it
> is not an insecure one. You could introduce an insecurity by using
> "password1" as the root password.
> 
>> (I fixed it by changing the "PermitRootLogin" value).
> 
> If you have a strong password for the root login you wouldn't have fixed
> anything.

Thanks Brian, I ended up removing openssh-server, as it was not
something I needed; it was automatically installed and set up to run as
a "feature" of the live CD I used to install Debian with (installed as
part of the "live-tools" package). Fortunately I came across the posting
that alerted me to this, and have removed it from both of my machines.

If I end up using openssh in the future I will definitely use a private
key, though.

Jon


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/52e80794.9000...@q.com

Reply via email to