F22 System Wide Change: Set sshd(8) PermitRootLogin=no
P J P
pj.pandit at yahoo.co.in
Mon Jan 12 17:20:45 UTC 2015
> On Monday, 12 January 2015 10:06 PM, Milan Keršláger wrote:
> No. It improves nothing. This is step backward.
> It gaves bad signal to the user ("strong root password is not needed").
Wrong interpretation.
> It does not mitigate the BF attack. The original and main reason was to
> mitigate BF even "P J P <pjp at fedoraproject.org>" told us here
> that not.
No! Again, intention is to keep malicious users from gaining 'root' access via BF attacks. It is quite similar to why we run services as non-root users, instead of root. If at all break-in happens, it is still a non-root user.
> The PJP told us that this is like SELinux or firewal. But firewall block
> all trafic. But SELinux does not allow to obey the rules it raises. And
> "PermitRootLogin=no" still allows BF
Which part of 'PermitRootLoing=yes|no' says anything about what to do with non-root account? It is not a mitigation for brute force attacks. The option merely says whether to allow remote root login or not.
> (which is hard to prove as I demonstrated before because it will lead to use much
> less quality passords for root and normal users too).
That's a hypothesis.
> If you really want to improve security and mitigate BF attacks against root, do this:
> A) do not run SSHD by default
That's a non-option.
> B) install a script by default to bann repeated login failures
> (there are many around here, just test them and ship one).
MaxAuthTries option could help with that.
---
Regards
-Prasad
http://feedmug.com
More information about the devel
mailing list