On Tue Sep 18, 2001 at 12:49:09AM -0400, Yura Gusev wrote:

> > SSH, not OpenSSH... OpenSSH as packaged (via updates) for Mandrake is
> > secure.
> 
> Today yes. Tomorow?

Then we may as well remove root from the system, right?  openssh isn't
going to be the only entry point into a system, or the only method
into root.  For example, what if there is a problem with su?  Then
preventing root from logging in via ssh won't make a difference... a
normal user can ssh in (or have his password brute-forced), and a
vulnerable su can be used to obtain root access.  Where's the
difference?

> > Preventing root logins via ssh is silly.  Any cracker worthy of the
> > title could brute force your primary user's account and then start to
> > play.  If you use an easy-to-guess root password, you shouldn't have
> > access to root.
> 
> Let's not make it personal ok?

Who's making it personal?  I'm stating fact here... there is nothing
personal in the above.  I am using "you" as a global... could be you,
could be me, could be any other Linux user in the world.  It's quite
impersonal, actually.

> > Arbitrarily deciding that users should not allow root logins via ssh
> > is not necessary.  A setting in msec could do this, or if you really
> > don't want to permit root login via ssh, turn it off yourself.  While
> > I agree it may be more secure, it's not *that* much more secure to
> > start changing things now.
> 
> OK i agree msec is a solution.

I think msec is the only solution.  msec can allow/disallow login from
the console, the same solution should apply.  If you allow root at the
console, I don't see why allowing root via openssh is any more of a
security risk.  If someone is willing to take the time to brute-force
your root password, someone could just as easily take the time to
brute-force your home's locks.  I'd wager someone could break into
your house (yours, mine, whomevers) faster than they could brute-force
your root password.

It's a careful balance.  If you have no need to ssh in as root, then
by all means set msec to level 4 and disable it.  I think most people
don't see the difference between sshing as root or su'ing as root an
sshing as a regular user.

If you want to be paranoid, disable root logins completely, remove su
from your system, and use sudo.  =)  At least there you can also
restrict root activity as opposed to just the root account (and
removing su, no "global" root access... use sudo for
command/utility-specific root access).

-- 
[EMAIL PROTECTED], OpenPGP key available on www.keyserver.net
1024D/FE6F2AFD   88D8 0D23 8D4B 3407 5BD7  66F9 2043 D0E5 FE6F 2AFD
 - Danen Consulting Services    www.danen.net, www.freezer-burn.org
 - MandrakeSoft, Inc. Security  www.linux-mandrake.com

Current Linux kernel 2.4.8-24mdk uptime: 13 hours 15 minutes.

PGP signature

Reply via email to