Containers and chroot (was: openssh-server's default config is dangerous)

2016-07-15 Thread Nicolas George
Le quintidi 25 messidor, an CCXXIV, Stefan Monnier a écrit : > FWIW, I also find it disappointing that I can't do it in an etc file of > some sort. Yes, such an essential option should be integral to the system, not brought by an obscure package. That the package exists is still better than nothin

Re: openssh-server's default config is dangerous

2016-07-13 Thread Brian
On Tue 12 Jul 2016 at 17:32:22 +0200, Nicolas George wrote: > Le quintidi 25 messidor, an CCXXIV, Brian a écrit : > > Not really. How to change Policy is adequately described on the Debian > > web site. How to submit a bug against openssh-server is also described. > > So you were talking about ch

Re: openssh-server's default config is dangerous

2016-07-13 Thread Stefan Monnier
> You could potentially just use the policyrcd-script-zg2 package, and > then your boolean setting would be: > > echo -e "#!/bin/sh\nexit101;" > /etc/policy-rc.d. > > Or something similar. [Or if you really just want a boolean, you could > potentially write your own package which plugged into pol

Re: openssh-server's default config is dangerous

2016-07-13 Thread Don Armstrong
On Tue, 12 Jul 2016, Stefan Monnier wrote: > >> I often need something like this when running inside a chroot and > >> always have trouble finding the clean&easy way to do it > > Here's one example that mk-sbuild uses: > > (jessie-amd64)$ cat /usr/sbin/policy-rc.d > > #!/bin/sh > > while true; do >

Re: openssh-server's default config is dangerous

2016-07-13 Thread Gene Heskett
On Wednesday 13 July 2016 07:32:10 Henrique de Moraes Holschuh wrote: > On Wed, 13 Jul 2016, Joe wrote: > > On Tue, 12 Jul 2016 20:09:31 +0100 > > > > Brian wrote: > > > The cat from next door always looks very intently at me when I am > > > at the keyboard. Is that normal feline behaviour? > > >

Re: openssh-server's default config is dangerous

2016-07-13 Thread Erwan David
Le 13/07/2016 à 13:32, Henrique de Moraes Holschuh a écrit : > On Wed, 13 Jul 2016, Joe wrote: >> On Tue, 12 Jul 2016 20:09:31 +0100 >> Brian wrote: >>> The cat from next door always looks very intently at me when I am at >>> the keyboard. Is that normal feline behaviour? >>> >> Yes. The weight o

Re: openssh-server's default config is dangerous

2016-07-13 Thread Henrique de Moraes Holschuh
On Wed, 13 Jul 2016, Joe wrote: > On Tue, 12 Jul 2016 20:09:31 +0100 > Brian wrote: > > The cat from next door always looks very intently at me when I am at > > the keyboard. Is that normal feline behaviour? > > > Yes. The weight of a cat is more than sufficient to operate most > keyboards. Not

Re: openssh-server's default config is dangerous

2016-07-13 Thread Joe
On Tue, 12 Jul 2016 21:51:41 +0100 Lisi Reisz wrote: > On Tuesday 12 July 2016 20:24:18 Brian wrote: > > (For those who think this is about password logins in general - it > > is not. It is about logging in as root). > > Thank you, Brian. You come up trumps again. I said that I hadn't > under

Re: openssh-server's default config is dangerous

2016-07-13 Thread Joe
On Tue, 12 Jul 2016 20:09:31 +0100 Brian wrote: > The cat from next door always looks very intently at me when I am at > the keyboard. Is that normal feline behaviour? > Yes. The weight of a cat is more than sufficient to operate most keyboards. -- Joe

Re: openssh-server's default config is dangerous

2016-07-12 Thread Stefan Monnier
>> I often need something like this when running inside a chroot and >> always have trouble finding the clean&easy way to do it > Here's one example that mk-sbuild uses: > (jessie-amd64)$ cat /usr/sbin/policy-rc.d > #!/bin/sh > while true; do > case "$1" in > -*) shift ;; > makedev)

Re: openssh-server's default config is dangerous

2016-07-12 Thread Don Armstrong
On Tue, 12 Jul 2016, Stefan Monnier wrote: > I often need something like this when running inside a chroot and > always have trouble finding the clean&easy way to do it Here's one example that mk-sbuild uses: (jessie-amd64)$ cat /usr/sbin/policy-rc.d #!/bin/sh while true; do case "$1" in

Re: openssh-server's default config is dangerous

2016-07-12 Thread Lisi Reisz
On Tuesday 12 July 2016 21:48:32 Stefan Monnier wrote: > > My solution to that is physical access to the computer, actually sitting > > in front of it - login without a password. > > While I don't need a strong password in such a situation, I do want some > password because I don't like it when oth

Re: openssh-server's default config is dangerous

2016-07-12 Thread Lisi Reisz
On Tuesday 12 July 2016 20:04:32 Don Armstrong wrote: > Considering that I maintain multiple things > which install daemons in Debian And most of us are very grateful. Lisi

Re: openssh-server's default config is dangerous

2016-07-12 Thread Stefan Monnier
> No, it does not. What you show is not an option, an option would be > something in /etc. This is editing a script in /usr/sbin, in complete > violation of any good practice with packages managers. FWIW, I also find it disappointing that I can't do it in an etc file of some sort. E.g. I often n

Re: openssh-server's default config is dangerous

2016-07-12 Thread Lisi Reisz
On Tuesday 12 July 2016 20:24:18 Brian wrote: > (For those who think this is about password logins in general - it is > not. It is about logging in as root). Thank you, Brian. You come up trumps again. I said that I hadn't understood the question. I did think it was about password logging in in

Re: openssh-server's default config is dangerous

2016-07-12 Thread Stefan Monnier
> My solution to that is physical access to the computer, actually sitting in > front of it - login without a password. While I don't need a strong password in such a situation, I do want some password because I don't like it when other people use my account (usually they don't like it either bec

Re: openssh-server's default config is dangerous

2016-07-12 Thread Don Armstrong
On Tue, 12 Jul 2016, Nicolas George wrote: > Le quintidi 25 messidor, an CCXXIV, Don Armstrong a écrit : > > That option already exists. See policy-rc.d. For example: > > > > https://jpetazzo.github.io/2013/10/06/policy-rc-d-do-not-start-services-automatically/ > > What you show is not an option,

Re: openssh-server's default config is dangerous

2016-07-12 Thread Brian
On Tue 12 Jul 2016 at 19:54:41 +0100, Lisi Reisz wrote: > On Tuesday 12 July 2016 19:16:37 Brian wrote: > > > > The question you say was presented (and hazily recollect) was presented > > because you were upgrading from Wheezy to Jessie. > > No, that is neither what I said nor what I meant. I do

Re: openssh-server's default config is dangerous

2016-07-12 Thread Nicolas George
Le quintidi 25 messidor, an CCXXIV, Don Armstrong a écrit : > This is incredibly rude. I stand by it. > This is the endless security vs utility debate. Indeed. The most secure system > That option already exists. See policy-rc.d. For example: > > https://jpetazzo.github.io/2013/10/06/policy-r

Re: openssh-server's default config is dangerous

2016-07-12 Thread Brian
On Tue 12 Jul 2016 at 18:53:29 +0200, mwnx wrote: > > So, you're blaming a perfectly good (and reasonably secure) way of > > remote access, but somehow assume that weak passwords are ok. > > By that logic you should not stop there. Why not blame any remote access > > mechanism that uses PAM for pa

Re: openssh-server's default config is dangerous

2016-07-12 Thread Don Armstrong
On Tue, 12 Jul 2016, Nicolas George wrote: > Le quintidi 25 messidor, an CCXXIV, Don Armstrong a écrit : > > If a services default configuration is insecure, it should be fixed. > > File a bug. > > If you think about it slightly more than two seconds, This is incredibly rude. Considering that I m

Re: openssh-server's default config is dangerous

2016-07-12 Thread Lisi Reisz
On Tuesday 12 July 2016 19:16:37 Brian wrote: > On Tue 12 Jul 2016 at 18:09:22 +0100, Lisi Reisz wrote: > > This was sent to me separately privately as well. I might have answered > > differently on the list, but I am not writing a second reply to the same > > post, so here is a copy-and-paste of

Re: openssh-server's default config is dangerous

2016-07-12 Thread Nicolas George
Le quintidi 25 messidor, an CCXXIV, Don Armstrong a écrit : > If a services default configuration is insecure, it should be fixed. > File a bug. If you think about it slightly more than two seconds, you will realize that if the default configuration does ANYTHING, even something that is completely

Re: openssh-server's default config is dangerous

2016-07-12 Thread Brian
On Tue 12 Jul 2016 at 18:09:22 +0100, Lisi Reisz wrote: > This was sent to me separately privately as well. I might have answered > differently on the list, but I am not writing a second reply to the same > post, so here is a copy-and-paste of my reply. > > On Tuesday 12 July 2016 17:45:58 mw

Re: openssh-server's default config is dangerous

2016-07-12 Thread Lisi Reisz
On Tuesday 12 July 2016 18:39:29 Erwan David wrote: > Le 12/07/2016 à 19:34, Lisi Reisz a écrit : > > My solution to that is physical access to the computer, actually sitting > > in front of it - login without a password. ALL external access, even > > from the neighbouring computer, use a strong p

Re: openssh-server's default config is dangerous

2016-07-12 Thread Erwan David
Le 12/07/2016 à 19:34, Lisi Reisz a écrit : > > My solution to that is physical access to the computer, actually sitting in > front of it - login without a password. ALL external access, even from the > neighbouring computer, use a strong password in case someone breaks into your > network from

Re: openssh-server's default config is dangerous

2016-07-12 Thread Lisi Reisz
On Tuesday 12 July 2016 18:14:04 Stefan Monnier wrote: > > This is different from what you originally said. By all means discuss > > this general problem with the developers - but please don't single ssh > > out and mess it up for a good many of the rest of us. > > I think we're miscommunicating:

Re: openssh-server's default config is dangerous

2016-07-12 Thread Stefan Monnier
> This is different from what you originally said. By all means discuss this > general problem with the developers - but please don't single ssh out and > mess it up for a good many of the rest of us. I think we're miscommunicating: I specifically don't want to single-out SSH but instead I want t

Re: openssh-server's default config is dangerous

2016-07-12 Thread Lisi Reisz
On Tuesday 12 July 2016 17:53:29 mwnx wrote: > > So, you're blaming a perfectly good (and reasonably secure) way of > > remote access, but somehow assume that weak passwords are ok. > > By that logic you should not stop there. Why not blame any remote access > > mechanism that uses PAM for password

Re: openssh-server's default config is dangerous

2016-07-12 Thread Lisi Reisz
This was sent to me separately privately as well. I might have answered differently on the list, but I am not writing a second reply to the same post, so here is a copy-and-paste of my reply. On Tuesday 12 July 2016 17:45:58 mwnx wrote: > On Tue, Jul 12, 2016 at 02:18:58PM +0100, Lisi Reisz wr

Re: openssh-server's default config is dangerous

2016-07-12 Thread Lisi Reisz
On Tuesday 12 July 2016 17:26:08 Stefan Monnier wrote: > I mean, yes, I can (and have) cobbled up some hackish way to plug the > holes I was aware of, but I think it would be better to be able to > specifically only allow weak password authentication for some specific > services and then stop worry

Re: openssh-server's default config is dangerous

2016-07-12 Thread mwnx
> So, you're blaming a perfectly good (and reasonably secure) way of > remote access, but somehow assume that weak passwords are ok. > By that logic you should not stop there. Why not blame any remote access > mechanism that uses PAM for password checking as well? There are many kinds of systems o

Re: openssh-server's default config is dangerous

2016-07-12 Thread mwnx
On Tue, Jul 12, 2016 at 02:18:58PM +0100, Lisi Reisz wrote: > I was asked last time I installed open-ssh*, at installation time, but did > not understand the question so went with the default. If you do not allow > password log-in, what DO you allow? For ssh to be useful, one has to use it. > Not

Re: openssh-server's default config is dangerous

2016-07-12 Thread Stefan Monnier
>> The original use case was to provide an account to my daughter who >> was not (yet) able to remember a strong password.  She wasn't going >> to use a console login either. > So a corner - and hopefully transitory ;-) - case. Originally, yes, but I learned in the mean time to appreciate the poss

Re: openssh-server's default config is dangerous

2016-07-12 Thread Reco
On Tue, Jul 12, 2016 at 03:40:05PM +0200, to...@tuxteam.de wrote: > On Tue, Jul 12, 2016 at 04:24:41PM +0300, Reco wrote: > > On Tue, Jul 12, 2016 at 02:55:29PM +0200, to...@tuxteam.de wrote: > > [...] > > > > While it makes sense to keep a more general solution in sight, sshd > > > is in many re

Re: openssh-server's default config is dangerous

2016-07-12 Thread Nicolas George
Le quintidi 25 messidor, an CCXXIV, Brian a écrit : > Not really. How to change Policy is adequately described on the Debian > web site. How to submit a bug against openssh-server is also described. So you were talking about changing the whole policy of the project, not an option to apt? What an u

Re: openssh-server's default config is dangerous

2016-07-12 Thread Lisi Reisz
On Tuesday 12 July 2016 14:53:41 Stefan Monnier wrote: > The original use case > was to provide an account to my daughter who was not (yet) able to > remember a strong password.  She wasn't going to use a console > login either. So a corner - and hopefully transitory ;-) - case. Set your system t

Re: openssh-server's default config is dangerous

2016-07-12 Thread Don Armstrong
On Tue, 12 Jul 2016, Nicolas George wrote: > That means the service ran for some time with the wrong config. Pwned. If a services default configuration is insecure, it should be fixed. File a bug. -- Don Armstrong https://www.donarmstrong.com I learned really early the dif

Re: openssh-server's default config is dangerous

2016-07-12 Thread Brian
On Tue 12 Jul 2016 at 16:35:49 +0200, Nicolas George wrote: > Le quintidi 25 messidor, an CCXXIV, Brian a écrit : > > Of course it can be changed. Jost change Policy. > > Care to elaborate? Not really. How to change Policy is adequately described on the Debian web site. How to submit a bug again

Re: openssh-server's default config is dangerous

2016-07-12 Thread Nemeth Gyorgy
2016-07-12 14:50 keltezéssel, to...@tuxteam.de írta: Hmmm. This would still allow password auth for user 1000 (and root (!)). No. The default sshd config is: PermitRootLogin prohibit-password And openssh-server is optional package, it is not installed by default. I think if someone decides to

Re: openssh-server's default config is dangerous

2016-07-12 Thread Nicolas George
Le quintidi 25 messidor, an CCXXIV, Brian a écrit : > Of course it can be changed. Jost change Policy. Care to elaborate? > It's already configured. Want another configuration? Alter and restart > the service. That means the service ran for some time with the wrong config. Pwned. > Stop the ser

Re: openssh-server's default config is dangerous

2016-07-12 Thread Stefan Monnier
>> This said, it doesn't quite address my need: rather than say "only allow >> SSH access to userfoo and userbar", I'd like to do "disallow non-GDM >> access for userfoo and userbar". > That would include the local Linux console? I'd be OK with either choice for console logins. The original use c

Re: openssh-server's default config is dangerous

2016-07-12 Thread tomas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Tue, Jul 12, 2016 at 10:41:33AM -0300, Henrique de Moraes Holschuh wrote: > On Tue, 12 Jul 2016, mwnx wrote: > > Currently, after installing openssh-server, anyone can gain access > > to any user's account on the system using only the corresponding

Re: openssh-server's default config is dangerous

2016-07-12 Thread Brian
On Tue 12 Jul 2016 at 15:06:33 +0200, Nicolas George wrote: > Le quintidi 25 messidor, an CCXXIV, Brian a écrit : > > The behaviour is sensible and acceptable. > > Yes, as long as it can be changed. Of course it can be changed. Jost change Policy. > > >

Re: openssh-server's default config is dangerous

2016-07-12 Thread Stefan Monnier
> SSH access to userfoo and userbar", I'd like to do "disallow non-GDM > access for userfoo and userbar". Let me rephrase that: I'd like to "disallow non-GDM use of userfoo and userbar's password for login". E.g. I'd still like to allow non-password logins via SSH for those users, since the only i

Re: openssh-server's default config is dangerous

2016-07-12 Thread tomas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Tue, Jul 12, 2016 at 02:18:58PM +0100, Lisi Reisz wrote: > On Tuesday 12 July 2016 13:50:39 to...@tuxteam.de wrote: > > My question would be... what would be the consequences of changing > > those defaults? Or perhaps, of asking the user at package

Re: openssh-server's default config is dangerous

2016-07-12 Thread tomas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Tue, Jul 12, 2016 at 09:31:41AM -0400, Stefan Monnier wrote: [...] > Indeed, I just saw those replies. Didn't know about AllowGroups. > > This said, it doesn't quite address my need: rather than say "only allow > SSH access to userfoo and userba

Re: openssh-server's default config is dangerous

2016-07-12 Thread Henrique de Moraes Holschuh
On Tue, 12 Jul 2016, mwnx wrote: > Currently, after installing openssh-server, anyone can gain access > to any user's account on the system using only the corresponding > user's password. As we know, people do not necessarily use the most > secure of passwords. This will especially be the case if t

Re: openssh-server's default config is dangerous

2016-07-12 Thread tomas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Tue, Jul 12, 2016 at 04:24:41PM +0300, Reco wrote: > On Tue, Jul 12, 2016 at 02:55:29PM +0200, to...@tuxteam.de wrote: [...] > > While it makes sense to keep a more general solution in sight, sshd > > is in many respects special. > > Such as? Hm

Re: openssh-server's default config is dangerous

2016-07-12 Thread Stefan Monnier
>> Reminds me of a need I couldn't conveniently satisfy: allow known weak >> passwords on some specific user accounts but make sure you can not use >> them remotely (in my case I only wanted to allow GDM logins for them). >> E.g. make it so that sshd only lets you login if your user is in the >> "s

Re: openssh-server's default config is dangerous

2016-07-12 Thread Reco
On Tue, Jul 12, 2016 at 02:55:29PM +0200, to...@tuxteam.de wrote: > On Tue, Jul 12, 2016 at 03:45:06PM +0300, Reco wrote: > > On Tue, Jul 12, 2016 at 02:20:38PM +0200, to...@tuxteam.de wrote: > > > I still think the OP has a point. [...] > > > I can think of several 'solutions for the problem', bu

Re: openssh-server's default config is dangerous

2016-07-12 Thread Lisi Reisz
On Tuesday 12 July 2016 13:50:39 to...@tuxteam.de wrote: > My question would be... what would be the consequences of changing > those defaults? Or perhaps, of asking the user at package config > time? I *was* asked last time I installed open-ssh*, at installation time, but did not understand the

Re: openssh-server's default config is dangerous

2016-07-12 Thread tomas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Tue, Jul 12, 2016 at 09:02:23AM -0400, Stefan Monnier wrote: > > That weak passwords are a problem in themselves or that other services > > get started right away after install too is irrelevant to the point > > made -- again IMHO. > > Reminds me o

Re: openssh-server's default config is dangerous

2016-07-12 Thread Nicolas George
Le quintidi 25 messidor, an CCXXIV, Brian a écrit : > The behaviour is sensible and acceptable. Yes, as long as it can be changed. > Anyone who installs a daemon > wants to use it; why install it in the first place? Tu configure it before starting it? T

Re: openssh-server's default config is dangerous

2016-07-12 Thread Stefan Monnier
> That weak passwords are a problem in themselves or that other services > get started right away after install too is irrelevant to the point > made -- again IMHO. Reminds me of a need I couldn't conveniently satisfy: allow known weak passwords on some specific user accounts but make sure you can

Re: openssh-server's default config is dangerous

2016-07-12 Thread tomas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Tue, Jul 12, 2016 at 03:45:06PM +0300, Reco wrote: > On Tue, Jul 12, 2016 at 02:20:38PM +0200, to...@tuxteam.de wrote: > > I still think the OP has a point. [...] > I can think of several 'solutions for the problem', but most of them are > either u

Re: openssh-server's default config is dangerous

2016-07-12 Thread tomas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Tue, Jul 12, 2016 at 08:34:33AM -0400, Dan Ritter wrote: [...] > The easiest thing to do is to change the default config: > > create a group, sshlogin > > Add root and UID 1000 (the user created at install time) to that > group. > > add this li

Re: openssh-server's default config is dangerous

2016-07-12 Thread Reco
Hi. On Tue, Jul 12, 2016 at 02:20:38PM +0200, to...@tuxteam.de wrote: > On Tue, Jul 12, 2016 at 03:05:35PM +0300, Reco wrote: > > Hi. > > > > On Tue, Jul 12, 2016 at 11:26:10AM +0200, mwnx wrote: > > > Currently, after installing openssh-server, anyone can gain access > > > to any use

Re: openssh-server's default config is dangerous

2016-07-12 Thread Dan Ritter
On Tue, Jul 12, 2016 at 02:20:38PM +0200, to...@tuxteam.de wrote: > On Tue, Jul 12, 2016 at 03:05:35PM +0300, Reco wrote: > > Hi. > > > > On Tue, Jul 12, 2016 at 11:26:10AM +0200, mwnx wrote: > > > Currently, after installing openssh-server, anyone can gain access > > > to any user's account o

Re: openssh-server's default config is dangerous

2016-07-12 Thread tomas
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On Tue, Jul 12, 2016 at 03:05:35PM +0300, Reco wrote: > Hi. > > On Tue, Jul 12, 2016 at 11:26:10AM +0200, mwnx wrote: > > Currently, after installing openssh-server, anyone can gain access > > to any user's account on the system using only the c

Re: openssh-server's default config is dangerous

2016-07-12 Thread Reco
Hi. On Tue, Jul 12, 2016 at 11:26:10AM +0200, mwnx wrote: > Currently, after installing openssh-server, anyone can gain access > to any user's account on the system using only the corresponding > user's password. As we know, people do not necessarily use the most > secure of passwords. Thi

Re: openssh-server's default config is dangerous

2016-07-12 Thread Brian
On Tue 12 Jul 2016 at 11:44:56 +0200, Nicolas George wrote: > Le quintidi 25 messidor, an CCXXIV, mwnx a écrit : > > I would like to initiate a discussion about the security > > implications of the default sshd_config file, created after an > > installation of the openssh-server package. > > I th

Re: openssh-server's default config is dangerous

2016-07-12 Thread Nicolas George
Le quintidi 25 messidor, an CCXXIV, mwnx a écrit : > I would like to initiate a discussion about the security > implications of the default sshd_config file, created after an > installation of the openssh-server package. I think the problem you raise is not specific to SSH: when installing anythin

openssh-server's default config is dangerous

2016-07-12 Thread mwnx
Hello, I would like to initiate a discussion about the security implications of the default sshd_config file, created after an installation of the openssh-server package. Currently, after installing openssh-server, anyone can gain access to any user's account on the system using only the correspo