Hi,

how about this one:

PermitRootLogin 192.168.1

Should any of the SSH maintainers be reading this: possible new SSH
feature?

Bill


On Thu, 2006-11-23 at 12:24 +0100, Igor Sobrado wrote:
> Hi again!
> 
> I have a question on the default behaviour of OpenSSH.  Please, do not
> understand that I am complaining on it or trying to change its behaviour
> in relation with remote root logins allowed by default on OpenSSH (but
> I certainly believe it would be nice, that is the reason I write this
> message to the misc@ mailing list).  Just want to share my opinion with
> the members of this mailing list.
> 
> First of all, I understand that remote root logins can be easily
> avoided by setting "PermitRootLogin" to "no" in /etc/ssh/sshd_config.
> I guess that remote root logins are allowed by default to simplify
> management of small network appliances that do not have user accounts
> on them.  But these appliances are only a small number of all OpenBSD
> installations and, even if this number is not so small, a restricted
> (non-root) account in the group wheel and probably in the group operator
> too, on these devices is advisable to avoid damaging these appliances
> by mistake.
> 
> In my humble opinion, there are three reasons to deny remote root logins
> by default:
> 
>   1. Remote root login enabled by default makes the wheel group
>      superfluous (i.e., why are used added to the wheel group when
>      a user not in this group can log in as root, once the root
>      password is known to him, by just typing "ssh [EMAIL PROTECTED]"?)
> 
>   2. There are a lot of threats against the root account based in
>      brute force attacks.  Most of us see logs on this matter in our
>      workstations and servers.  Sometimes these threats, done by
>      humans, network scanners or even worms, are successful.  It is
>      just a matter of (bad) luck.
> 
>   3. OpenBSD is "secure by default"; all services should be configured
>      to the most secure defaults.  I think that this reason is as good
>      as the previous ones.  And not allowing remote root logins by
>      default makes sense to me in relation with this goal.
> 
> Someone that really wants to allow remote root logins should be able to
> enable this feature just changing /etc/ssh/sshd_config.  But, in my
> humble opinion, most users do not really want this dangerous feature
> enabled by default.  And, even on small network appliances, an unprivileged
> account in the wheel group (and even in the operator group) is a good
> management practice.
> 
> [please, send copies of replies to this post to me if possible.  I will
> do my best to answer any post, even if not sent to me, but it will be
> more difficult tracking who sent the message I am replying to.]
> 
> Cheers,
> Igor.

Reply via email to