CLT 2007 is overTrackbacks
Trackback specific URI for this entry
No Trackbacks
Comments
Display comments as
(Linear | Threaded)
The reasoning is in the README.Debian... although I don't agree with them.
Hi Nico,
you might want to read "PermitRootLogin set to yes" in /usr/share/doc/ssh/README.Debian.gz
Yes did this after Thijs gave the hint. Thanks, the other DDs at CLT didn't know too But the argumentation is somehow strange.
Well, disallowing password authentication at all would IMO be of a greater benefit to the averange user than disallowing root login - those who use a weak root password most likely also have a weak password on their user account. And from that its only a matter of sudo (with the known user password), su (forcing the weak root password or waiting for the user to do it) or the next local root exploit that comes along. So there I do agree with the rationale given in README.Debian.
Speaking of "loosing" passwords, there also is a client side setting worth noting: Disallowing tunneled clear text (as opposed to challenge response) password authentication by setting "PasswordAuthentication no" in /etc/ssh/ssh_config to avoid passwords ever being given out to a remote ssh server. Add Comment
|
Calendar
QuicksearchSupportRecent Entries
CategoriesTag cloud23c3 acpi advertising annouce announce april argh art awards bash blogging bugs c cli code conferences config configuration data mining debconf debian dell dns documentation email errm? events exploit fail fail2ban filesharing films flame fun gcc google graphs grml gsm hacking hacks hardware heise images information installation internet irc knowledge libacpi links linux mobile phones network news newsbeuter omg open source opera passwords php power privacy programming qa random blurb rant release releases rss scripts security service setup shell sms software spam ssh stfl stuff terminal tests text mode tip tips tools troubleshooting unix user video vim.editing web web 2.0 websites wordpress wtf www youtube zsh
|