F22 System Wide Change: Set sshd(8) PermitRootLogin=no

P J P pj.pandit at yahoo.co.in
Mon Jan 12 17:20:45 UTC 2015


> On Monday, 12 January 2015 10:06 PM, Milan Keršláger wrote:
> No. It improves nothing. This is step backward.
> It gaves bad signal to the user ("strong root password is not needed").

  Wrong interpretation.

> It does not mitigate the BF attack. The original and main reason was to
> mitigate BF even "P J P <pjp at fedoraproject.org>" told us here 
> that not.

  No! Again, intention is to keep malicious users from gaining 'root' access via BF attacks. It is quite similar to why we run services as non-root users, instead of root. If at all break-in happens, it is still a non-root user.


> The PJP told us that this is like SELinux or firewal. But firewall block
> all trafic. But SELinux does not allow to obey the rules it raises. And
> "PermitRootLogin=no" still allows BF

  Which part of 'PermitRootLoing=yes|no' says anything about what to do with non-root account? It is not a mitigation for brute force attacks. The option merely says whether to allow remote root login or not.

> (which is hard to prove as I demonstrated before because it will lead to use much
> less quality passords for root and normal users too).

  That's a hypothesis.

> If you really want to improve security and mitigate BF attacks against root, do this:
> A) do not run SSHD by default

  That's a non-option.
 
> B) install a script by default to bann repeated login failures
>   (there are many around here, just test them and ship one).

  MaxAuthTries option could help with that.


---
Regards
   -Prasad
http://feedmug.com


More information about the devel mailing list