On Mon 2016-08-15 18:42:01 -0700, Matt Taggart wrote:
> There is an old upstream issue #20
>   http://cmrg.fifthhorseman.net/ticket/20
> to have a way to enable the network and ssh by default.
>
> I would still like this and in addition to the good ideas mentioned there I 
> think it would be nice if the ssh host key fingerprints were added to 
> /etc/motd (or something similar).
>
> Also, even if network and ssh aren't enabled by default in the example 
> shipped profiles, what do you think about adding ssh to the package list? 
> (and then at least you could start them by hand)

This seems like several different questions:

 (a) do we want to have the network enabled by default on the rescue
     image?

 (b) do we want to install openssh-client?

 (c) do we want to install openssh-server?


Here's my thinking on those:

 (a) i don't think we should enable the network by default in the rescue
     image.  It should be something that can be safely used for
     forensics, and opening the device to the network seems like it's
     asking for trouble.

 (b) i don't have any objection to adding openssh-client to the default
     rescue installation.  It provides useful utilities for dealing with
     keys in discovered/rescued filesystems, as well as for extracting
     and exporting recovered data.

 (c) I'm more reluctant about shipping openssh-server enabled by
     default, for the same sort of forensics concerns i have in (a).  So
     perhaps we could ship it, but have the service disabled by default,
     so the local admin would need to do:

         systemctl start ssh

     explicitly before it ran?  I'm unsure what the right way to do that
     is.  do we touch /etc/ssh/sshd_not_to_be_run ?  do we run
     "systemctl disable ssh" from a debirf module?  something else?

Suggestions welcome,

   --dkg

Attachment: signature.asc
Description: PGP signature

Reply via email to