Default Fedora installation suffers from egregious configuration flaw

Kevin Fenzi kevin at scrye.com
Thu May 19 13:18:38 UTC 2011


On Wed, 18 May 2011 17:35:38 -0700
dirk cummings <sexynaya2010 at hotmail.com> wrote:

> 
> On a default install of Fedora 14, and also the latest release
> candidate for 15, the user is presented with:
> 
> An iptables rule that opens port 22 to the worldsshd service
> automatically startedsshd_config with default option: PermitRootLogin
> yes It's like every new install comes with the keys to the castle
> hanging on outside of the door for anyone who comes knocking.
> 
> I find this situation a serious oversight in light of the fact that
> Fedora obviously values security (like selinux, or how the installer
> forces a minimum password length, etc)
> 
> Any experienced linux user will know to check iptables and disable
> unnecessary services, but I wouldn't expect this from a new linux
> user (exactly the people the refreshed GNOME experience is supposed
> to attract).  I think the default configuration should be in the name
> of security, and sshd should not be listening on a default port with
> an open rule with root login enabled.

The reason for this has been headless installs. Ie, if you install via
vnc or the like, and finish the install and reboot and don't have
access to the physical console, ssh is your only way to access the
newly installed machine and setup accounts, etc. 

If someone can come up with a solution that covers this case, we could
revisit this, but it's not an case thats easy to fix in any kind of
clean way. ;( 

If it's brute force attacks that are the vector of concern, perhaps we
could look at a default hashlimit rule in front of the ssh. (ie, 1
attempt per minute or the like). 

kevin
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 198 bytes
Desc: not available
Url : http://lists.fedoraproject.org/pipermail/security/attachments/20110519/a766a930/attachment-0001.bin 


More information about the security mailing list