Pascal Hambourg <pas...@plouf.fr.eu.org> writes:

> On 25/02/2024 at 01:17, Matthew Wilcox wrote:
>> 
>> I just did an installation with the 2024-02-24
>> debian-testing-amd64-netinst.iso image.  I forget the exact wording
>> used, but when setting up a user, d-i printed advice that user passwords
>> should be changed frequently.  This is no longer current good advice
>> (since 2017):
>
> This topic has some history, see
> <https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=656509>
> <https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=868869>
> <https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998408>
> <https://salsa.debian.org/installer-team/user-setup/-/merge_requests/7>

It had not occured to me until Matthew's suggestion that we might simply
remove the obsolete advice, rather than trying to improve the wording.

In light of that, I've split the MR into 2 commits, the first of which
removes the old advice (which hopefully inflicts the smallest possible
load on our translators) and the second of which is an attempt to come
up with something better (criticism welcome, I've had multiple attempts
at this, so I imagine there's still room for improvement).

Depending upon whether we think it's worth using translators' time on
this subject, we can then select one or both commits, and finally close
these bugs.

You can see my latest attempt here:

  https://openqa.debian.net/tests/238094#step/passwords/1

in which I'm recommending setting no password for root, which then gives
the initial user 'sudo' membership[1].

The slightly awkward thing about this recommendation is that it
encourages people to put themselves in the situation that:

  https://salsa.debian.org/installer-team/user-setup/-/merge_requests/6

is trying to address, so if we make this recommendation, we should also
deal with that issue (which I think we should do anyway).

Cheers, Phil.

[1] This strikes me as decent advice for newbies, for whom this sort of
    guidance is most necessary. The problem with asking a newbie for a
    root password is that they're likely to choose a poor one. Even if
    they later realise that they should have choosen better passwords,
    they may well not at that point remember that they still have a
    useless password for root that needs updating.

    On the other hand, now that ssh defaults to not allowing password
    based logins to root, perhaps the potential presence of a poor
    password on a sudo enabled account should be of greater concern,
    since that will still be open to remote logins, so I can see that
    one could argue this either way.
-- 
Philip Hands -- https://hands.com/~phil

Attachment: signature.asc
Description: PGP signature

Reply via email to