On Tue Sep 18, 2001 at 12:49:09AM -0400, Yura Gusev wrote:
> > SSH, not OpenSSH... OpenSSH as packaged (via updates) for Mandrake is
> > secure.
>
> Today yes. Tomorow?
Then we may as well remove root from the system, right? openssh isn't
going to be the only entry point into a system, or the only method
into root. For example, what if there is a problem with su? Then
preventing root from logging in via ssh won't make a difference... a
normal user can ssh in (or have his password brute-forced), and a
vulnerable su can be used to obtain root access. Where's the
difference?
> > Preventing root logins via ssh is silly. Any cracker worthy of the
> > title could brute force your primary user's account and then start to
> > play. If you use an easy-to-guess root password, you shouldn't have
> > access to root.
>
> Let's not make it personal ok?
Who's making it personal? I'm stating fact here... there is nothing
personal in the above. I am using "you" as a global... could be you,
could be me, could be any other Linux user in the world. It's quite
impersonal, actually.
> > Arbitrarily deciding that users should not allow root logins via ssh
> > is not necessary. A setting in msec could do this, or if you really
> > don't want to permit root login via ssh, turn it off yourself. While
> > I agree it may be more secure, it's not *that* much more secure to
> > start changing things now.
>
> OK i agree msec is a solution.
I think msec is the only solution. msec can allow/disallow login from
the console, the same solution should apply. If you allow root at the
console, I don't see why allowing root via openssh is any more of a
security risk. If someone is willing to take the time to brute-force
your root password, someone could just as easily take the time to
brute-force your home's locks. I'd wager someone could break into
your house (yours, mine, whomevers) faster than they could brute-force
your root password.
It's a careful balance. If you have no need to ssh in as root, then
by all means set msec to level 4 and disable it. I think most people
don't see the difference between sshing as root or su'ing as root an
sshing as a regular user.
If you want to be paranoid, disable root logins completely, remove su
from your system, and use sudo. =) At least there you can also
restrict root activity as opposed to just the root account (and
removing su, no "global" root access... use sudo for
command/utility-specific root access).
--
[EMAIL PROTECTED], OpenPGP key available on www.keyserver.net
1024D/FE6F2AFD 88D8 0D23 8D4B 3407 5BD7 66F9 2043 D0E5 FE6F 2AFD
- Danen Consulting Services www.danen.net, www.freezer-burn.org
- MandrakeSoft, Inc. Security www.linux-mandrake.com
Current Linux kernel 2.4.8-24mdk uptime: 13 hours 15 minutes.
PGP signature