Hello,
Sshd(8) daemon by default allows remote users to login as root.
1. Is that really necessary?
2. Lot of users use their systems as root, without even creating a
non-root user.
Such practices need to be discouraged, not allowing remote root
login could be
useful in
Hello,
On Monday, 12 January 2015 4:09 PM, Ian Malone ibmal...@gmail.com wrote:
On 12 January 2015 at 09:20, Milan Keršláger milan.kersla...@pslib.cz
4) Blocking root access means forcing admins to log as normal user and
then do su/sudo and providing root password, which is far less
On 27/11/14 14:52, Nico Kadel-Garcia wrote:
On Thu, Nov 27, 2014 at 8:06 AM, P J P pj.pan...@yahoo.co.in wrote:
Overall this feature adds more value to Fedora, than its perceived short
term cost.
I agree, from a basic security standpoint, that it's the simplest
change with the largest
On Wednesday, 24 December 2014 3:07 PM, Andrew Haley wrote:
At some loss of usability. To often we hear This is better for
security, therefore we should do it without considering the usability
trade-off.
It'll help if you could define this some loss of usability. If it is about
remotely
On 24 Dec 2014, at 09:29, P J P wrote:
On Wednesday, 24 December 2014 3:07 PM, Andrew Haley wrote:
At some loss of usability. To often we hear This is better for
security, therefore we should do it without considering the
usability
trade-off.
It'll help if you could define this some
On Wednesday, 24 December 2014 11:01 PM, Mike Pinkerton wrote:
Remotely installed on bare metal.
I see. Is there a provision that you could edit the kick-start file? Or
supply parameters to it?? If so, it could be possible to enable remote root
login post install. If not, let's see how we
- Original Message -
On Wed, Nov 26, 2014 at 11:48 AM, Scott Schmit i.g...@comcast.net wrote:
On Tue, Nov 25, 2014 at 09:56:59AM -0500, Simo Sorce wrote:
On Sat, 22 Nov 2014 08:24:32 + (UTC) P J P wrote:
On Saturday, 22 November 2014 1:39 AM, Richard W.M. Jones wrote:
On
Hello Tomas,
On Thursday, 27 November 2014 3:05 PM, Tomas Mraz wrote:
- Original Message -
On Wed, Nov 26, 2014 at 11:48 AM, Scott Schmit wrote:
Look, this is a basic system configuration. It's not Cripple Mr.
Onion. Pick *one* setting, and let people know from that whether
Am 27.11.2014 um 12:13 schrieb P J P:
Just because it is easy to infer non-root user names does not mean we tell people
it is 'root'. Secondly, it might be easy for you to infer such names, not for
everyone. The increased difficulty level that is added by not allowing remote root
login could
On Thursday, 27 November 2014 4:49 PM, Reindl Harald wrote:
so why not consider disable sshd at all and make a checkbox
in Anaconda ssh support yes/no because after somebody says yes
it's his clearly decision and he is responsible to secure it with key-only
auth
Sure these are options,
On Thu, Nov 27, 2014 at 8:06 AM, P J P pj.pan...@yahoo.co.in wrote:
On Thursday, 27 November 2014 4:49 PM, Reindl Harald wrote:
so why not consider disable sshd at all and make a checkbox
in Anaconda ssh support yes/no because after somebody says yes
it's his clearly decision and he is
On 25.11.2014 18:25, Simo Sorce wrote:
On Tue, 25 Nov 2014 17:05:59 + (UTC)
P J P pj.pan...@yahoo.co.in wrote:
Hi,
On Tuesday, 25 November 2014 10:00 PM, Gabriel Ramirez wrote:
I have a server which only runs several VM's with specific
services, no need user accounts in the host or
On Tue, Nov 25, 2014 at 09:56:59AM -0500, Simo Sorce wrote:
On Sat, 22 Nov 2014 08:24:32 + (UTC) P J P wrote:
On Saturday, 22 November 2014 1:39 AM, Richard W.M. Jones wrote:
On Fri, Nov 21, 2014 at 09:11:51AM +0100, Florian Weimer wrote:
The latter. We have to install
On Wed, Nov 26, 2014 at 11:48 AM, Scott Schmit i.g...@comcast.net wrote:
On Tue, Nov 25, 2014 at 09:56:59AM -0500, Simo Sorce wrote:
On Sat, 22 Nov 2014 08:24:32 + (UTC) P J P wrote:
On Saturday, 22 November 2014 1:39 AM, Richard W.M. Jones wrote:
On Fri, Nov 21, 2014 at 09:11:51AM
On Sat, 22 Nov 2014 08:24:32 + (UTC)
P J P pj.pan...@yahoo.co.in wrote:
On Saturday, 22 November 2014 1:39 AM, Richard W.M. Jones wrote:
On Fri, Nov 21, 2014 at 09:11:51AM +0100, Florian Weimer wrote:
The latter. We have to install authorized_keys inside the VM
anyway, so we can
On Tue, 25 Nov 2014 09:56:59 -0500
Simo Sorce s...@redhat.com wrote:
We can install machine w/o user accounts, removing the ability to log
in as root via ssh means those machines will not be accessible.
This has been the reason this hasn't been changed the last few times
someone proposed to
On Tue, 25 Nov 2014 08:23:22 -0700
Kevin Fenzi ke...@scrye.com wrote:
On Tue, 25 Nov 2014 09:56:59 -0500
Simo Sorce s...@redhat.com wrote:
We can install machine w/o user accounts, removing the ability to
log in as root via ssh means those machines will not be accessible.
This has been
On Tuesday, 25 November 2014 8:53 PM, Kevin Fenzi wrote:
On Tue, 25 Nov 2014 09:56:59 -0500
Simo Sorce wrote:
We can install machine w/o user accounts, removing the ability to log
in as root via ssh means those machines will not be accessible.
This has been the reason this hasn't been
On Tue, Nov 25, 2014 at 03:45:08PM +, P J P wrote:
True, this concern has been raised before. We need to ensure that
user creates at least one non-root user account; firstboot is just
the right place to ensure that.
Keep in mind that in cloud, cloud-init does the same thing (instead of
On Tuesday, 25 November 2014 9:07 PM, Simo Sorce wrote:
My machines get joined to an IPA domain as soon as they are finished
installing, I do *not* want a local user, it would be a liability.
Well, I think this is more specific case for which remote 'root' login could
be enabled by user.
Hello Matthew,
On Tuesday, 25 November 2014 9:21 PM, Matthew Miller wrote:
Keep in mind that in cloud, cloud-init does the same thing (instead of
firstboot).
Ah I see, cool!
---
Regards
-Prasad
http://feedmug.com
--
devel mailing list
devel@lists.fedoraproject.org
On 11/25/2014 09:45 AM, P J P wrote:
On Tuesday, 25 November 2014 8:53 PM, Kevin Fenzi wrote:
On Tue, 25 Nov 2014 09:56:59 -0500
Simo Sorce wrote:
We can install machine w/o user accounts, removing the ability to log
in as root via ssh means those machines will not be accessible.
This has
Hi,
On Tuesday, 25 November 2014 10:00 PM, Gabriel Ramirez wrote:
I have a server which only runs several VM's with specific services, no
need user accounts in the host or in the VM's,
so you propose when I reiinstall any of them create a user account in
each of them, that will cause
On Tue, 25 Nov 2014 17:05:59 + (UTC)
P J P pj.pan...@yahoo.co.in wrote:
Hi,
On Tuesday, 25 November 2014 10:00 PM, Gabriel Ramirez wrote:
I have a server which only runs several VM's with specific
services, no need user accounts in the host or in the VM's,
so you propose when
On 11/25/2014 11:05 AM, P J P wrote:
Hi,
On Tuesday, 25 November 2014 10:00 PM, Gabriel Ramirez wrote:
I have a server which only runs several VM's with specific services, no
need user accounts in the host or in the VM's,
so you propose when I reiinstall any of them create a user account
On 11/21/2014 08:11 AM, P J P wrote:
Hello,
Sshd(8) daemon by default allows remote users to login as root.
1. Is that really necessary?
The original bug report [1] was kept opened mainly due to the lack of
adding user functionality in anaconda. This is no more true, anaconda
has
On Tue, Nov 25, 2014 at 09:20:35PM +0100, Petr Lautrbach wrote:
There are several use cases when local non-root users are not needed at
all as others already pointed out.
Including in some cases where there should both be no root password
_and_ no local non-system users.
The change itself is
On Tue, Nov 25, 2014 at 10:23 AM, Kevin Fenzi ke...@scrye.com wrote:
On Tue, 25 Nov 2014 09:56:59 -0500
Simo Sorce s...@redhat.com wrote:
We can install machine w/o user accounts, removing the ability to log
in as root via ssh means those machines will not be accessible.
This has been the
On Sunday, 23 November 2014 1:59 AM, Rahul Sundaram wrote:
I would suggesting going through the feature process. Although the config
file change itself is trivial, there are multiple components that require
coordination with several teams (Anaconda, Fedora Security team, openSSH,
GNOME etc),
On Monday, 24 November 2014 2:59 PM, P J P wrote:
On Sunday, 23 November 2014 1:59 AM, Rahul Sundaram wrote:
I would suggesting going through the feature process...
Having FESCo review a proposal is useful as well.
Right, makes sense. I'll do that.
Please see -
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Fri, 21 Nov 2014 07:11:27 + (UTC)
P J P pj.pan...@yahoo.co.in wrote:
Hello,
Sshd(8) daemon by default allows remote users to login as root.
1. Is that really necessary?
2. Lot of users use their systems as root, without even
On Sun, Nov 23, 2014 at 7:44 PM, Dennis Gilmore den...@ausil.us wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Fri, 21 Nov 2014 07:11:27 + (UTC)
P J P pj.pan...@yahoo.co.in wrote:
Hello,
Sshd(8) daemon by default allows remote users to login as root.
1. Is that really
On Saturday, 22 November 2014 1:39 AM, Richard W.M. Jones wrote:
On Fri, Nov 21, 2014 at 09:11:51AM +0100, Florian Weimer wrote:
The latter. We have to install authorized_keys inside the VM
anyway, so we can touch sshd_config, too.
Virt-builder has a new '--ssh-inject' feature (in F22
Am 22.11.2014 um 09:24 schrieb P J P:
So far the consensus seem that it is okay to reverse the current default and
set PermitRootLogin=no. I'll talk to the upstream maintainer -
plautrba(https://fedoraproject.org/wiki/User:Plautrba).
Sorry for being late to the party.
I'm ok with no root
On Saturday, 22 November 2014 4:29 PM, Felix Schwarz wrote
I'm ok with no root login assuming that one can ssh into the machine (and
become root somehow) after an install (this is along the lines of what Harald
Reindl mentioned yesterday).
Yes, true. One would definitely need a non-user
Hi
On Sat, Nov 22, 2014 at 7:24 AM, P J P wrote:
Yes, we'll ensure that noone is locked out of their systems after a fresh
install or upgrade.
This seems pretty tricky to ensure. Anaconda doesn't enforce an additional
user because that could be done via the initial setup or gnome initial
On Saturday, 22 November 2014 9:28 PM, Rahul Sundaram wrote:
This seems pretty tricky to ensure. Anaconda doesn't enforce
an additional user because that could be done via the initial
setup or gnome initial setup. IIRC, the interactions between
them were pretty non obvious already.
Yes,
Hi
Yes, true. We need to talk to them about it yet; still in the process.
And that's why I was wondering if it needs to be a fully fledged feature?
or just talking to upstream maintainers would do it?
I would suggesting going through the feature process. Although the config
file change
On Friday, 21 November 2014 1:24 PM, Florian Weimer wrote:
On 11/21/2014 08:34 AM, Jan Kratochvil wrote:
Almost all of my Fedora installations are test VMs where
any security is irrelevant.
Okay. But does enabling root login offer any significant benefit in that?
IOW, if it's disabled by
On 11/21/2014 09:04 AM, P J P wrote:
My point is that once we address this (most likely through some
configuration generation during VM setup), we can also switch
PermitRootLogin on.
You mean off? Or that we disable it by default and enable it while setting
up a new VM?
The latter. We
El 2014-11-21 08:49, Christian Rose escribió:
2014-11-21 8:11 GMT+01:00 P J P pj.pan...@yahoo.co.in:
Sshd(8) daemon by default allows remote users to login as root.
1. Is that really necessary?
2. Lot of users use their systems as root, without even creating
a non-root user.
Such practices
On Fr, 2014-11-21 at 09:11 +0100, Florian Weimer wrote:
On 11/21/2014 09:04 AM, P J P wrote:
My point is that once we address this (most likely through some
configuration generation during VM setup), we can also switch
PermitRootLogin on.
You mean off? Or that we disable it by
Am 21.11.2014 um 08:11 schrieb P J P:
Sshd(8) daemon by default allows remote users to login as root.
1. Is that really necessary?
2. Lot of users use their systems as root, without even creating a non-root
user.
Such practices need to be discouraged, not allowing remote root
On 11/21/2014 09:04 AM, P J P wrote:
On Friday, 21 November 2014 1:24 PM, Florian Weimer wrote:
On 11/21/2014 08:34 AM, Jan Kratochvil wrote:
Almost all of my Fedora installations are test VMs where
any security is irrelevant.
Okay. But does enabling root login offer any significant
On 11/21/2014 09:42 AM, Reindl Harald wrote:
why? because they are servers for specific tasks and *any* non-root login
would be followed by su - root anyways and for automated rsync scripts
backing up data only root has access you need it also
For rsync-as-root use cases my usual approach
Am 21.11.2014 um 11:55 schrieb Roberto Ragusa:
On 11/21/2014 09:42 AM, Reindl Harald wrote:
why? because they are servers for specific tasks and *any* non-root login would be
followed by su - root anyways and for automated rsync scripts backing up data
only root has access you need it also
Am 21.11.2014 um 12:05 schrieb Reindl Harald:
Am 21.11.2014 um 11:55 schrieb Roberto Ragusa:
On 11/21/2014 09:42 AM, Reindl Harald wrote:
why? because they are servers for specific tasks and *any* non-root
login would be followed by su - root anyways and for automated
rsync scripts backing
On 2014-11-21, 10:55 GMT, Roberto Ragusa wrote:
For rsync-as-root use cases my usual approach is to create
another account with userid=0 and login with ssh on this
account.
Proper way is actually to use command parameter in
authorized_keys on server and for example
On Fri, Nov 21, 2014 at 09:11:51AM +0100, Florian Weimer wrote:
On 11/21/2014 09:04 AM, P J P wrote:
My point is that once we address this (most likely through some
configuration generation during VM setup), we can also switch
PermitRootLogin on.
You mean off? Or that we disable it by
Hello,
Sshd(8) daemon by default allows remote users to login as root.
1. Is that really necessary?
2. Lot of users use their systems as root, without even creating a non-root
user.
Such practices need to be discouraged, not allowing remote root login
could be
useful in that.
On Fri, Nov 21, 2014 at 12:41 PM, P J P pj.pan...@yahoo.co.in wrote:
Hello,
Sshd(8) daemon by default allows remote users to login as root.
1. Is that really necessary?
2. Lot of users use their systems as root, without even creating a non-root
user.
Such practices need to be
On Fri, 21 Nov 2014 08:11:27 +0100, P J P wrote:
Does it make sense to disable remote root login by default? If so, do we
need to just report it to the maintainer or it would be treated as
a feature?
Almost all of my Fedora installations are test VMs where any security is
irrelevant.
Just my
2014-11-21 8:11 GMT+01:00 P J P pj.pan...@yahoo.co.in:
Sshd(8) daemon by default allows remote users to login as root.
1. Is that really necessary?
2. Lot of users use their systems as root, without even creating a
non-root user.
Such practices need to be discouraged, not allowing
On 11/21/2014 08:34 AM, Jan Kratochvil wrote:
On Fri, 21 Nov 2014 08:11:27 +0100, P J P wrote:
Does it make sense to disable remote root login by default? If so, do we
need to just report it to the maintainer or it would be treated as
a feature?
Almost all of my Fedora installations are test
54 matches
Mail list logo