diff options
author | Colin Watson <cjwatson@debian.org> | 2014-03-20 02:14:01 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2014-03-27 15:50:29 +0000 |
commit | 0a00050c1e005182cb69c672eb53000b9dcdba2c (patch) | |
tree | 6e1b4c319ed0cd4638320aebd28c3a4955e2e3c7 /debian/README.Debian | |
parent | 96f6b414c09ec85a923e02df06a90d935283f06e (diff) |
Change to "PermitRootLogin without-password" for new installations
Also ask a debconf question when upgrading systems with "PermitRootLogin
yes" from previous versions.
Closes: #298138
Diffstat (limited to 'debian/README.Debian')
-rw-r--r-- | debian/README.Debian | 68 |
1 files changed, 35 insertions, 33 deletions
diff --git a/debian/README.Debian b/debian/README.Debian index 6e6bf9dc8..4d16eb4d8 100644 --- a/debian/README.Debian +++ b/debian/README.Debian | |||
@@ -15,39 +15,41 @@ Privilege separation is turned on by default, so, if you decide you | |||
15 | want it turned off, you need to add "UsePrivilegeSeparation no" to | 15 | want it turned off, you need to add "UsePrivilegeSeparation no" to |
16 | /etc/ssh/sshd_config. | 16 | /etc/ssh/sshd_config. |
17 | 17 | ||
18 | PermitRootLogin set to yes | 18 | PermitRootLogin |
19 | -------------------------- | 19 | --------------- |
20 | 20 | ||
21 | This is now the default setting (in line with upstream), and people | 21 | As of 1:6.6p1-1, new installations will be set to "PermitRootLogin |
22 | who asked for an automatically-generated configuration file when | 22 | without-password". This disables password authentication for root, foiling |
23 | upgrading from potato (or on a new install) will have this setting in | 23 | password dictionary attacks on the root user. Some sites may wish to use |
24 | their /etc/ssh/sshd_config file. | 24 | the stronger "PermitRootLogin forced-commands-only" or "PermitRootLogin no", |
25 | 25 | but note that "PermitRootLogin no" will break setups that SSH to root with a | |
26 | Should you wish to change this setting, edit /etc/ssh/sshd_config, and | 26 | forced command to take full-system backups. You can use PermitRootLogin in |
27 | change: | 27 | a Match block if you want finer-grained control here. |
28 | PermitRootLogin yes | 28 | |
29 | to: | 29 | For many years Debian's OpenSSH packaging used "PermitRootLogin yes", in |
30 | PermitRootLogin no | 30 | line with upstream. To avoid breaking local setups, this is still true for |
31 | 31 | installations upgraded from before 1:6.6p1-1. If you wish to change this, | |
32 | Having PermitRootLogin set to yes means that an attacker that knows | 32 | you should edit /etc/ssh/sshd_config, change it manually, and run "service |
33 | the root password can ssh in directly (without having to go via a user | 33 | ssh restart" as root. |
34 | account). If you set it to no, then they must compromise a normal user | 34 | |
35 | account. In the vast majority of cases, this does not give added | 35 | Disabling PermitRootLogin means that an attacker possessing credentials for |
36 | security; remember that any account you su to root from is equivalent | 36 | the root account (any credentials in the case of "yes", or private key |
37 | to root - compromising this account gives an attacker access to root | 37 | material in the case of "without-password") must compromise a normal user |
38 | easily. If you only ever log in as root from the physical console, | 38 | account rather than being able to SSH directly to root. Be careful to avoid |
39 | then you probably want to set this value to no. | 39 | a false illusion of security if you change this setting; any account you |
40 | 40 | escalate to root from should be considered equivalent to root for the | |
41 | As an aside, PermitRootLogin can also be set to "without-password" or | 41 | purposes of security against external attack. You might for example disable |
42 | "forced-commands-only" - see sshd(8) for more details. | 42 | it if you know you will only ever log in as root from the physical console. |
43 | 43 | ||
44 | DO NOT FILE BUG REPORTS SAYING YOU THINK THIS DEFAULT IS INCORRECT! | 44 | Since the root account does not generally have non-password credentials |
45 | 45 | unless you explicitly install an SSH public key in its | |
46 | The argument above is somewhat condensed; I have had this discussion | 46 | ~/.ssh/authorized_keys, which you presumably only do if you want to SSH to |
47 | at great length with many people. If you think the default is | 47 | it, "without-password" should be a reasonable default for most sites. |
48 | incorrect, and feel strongly enough to want to argue about it, then | 48 | |
49 | send email to debian-ssh@lists.debian.org. I will close bug reports | 49 | For further discussion, see: |
50 | claiming the default is incorrect. | 50 | |
51 | https://bugs.debian.org/298138 | ||
52 | https://bugzilla.mindrot.org/show_bug.cgi?id=2164 | ||
51 | 53 | ||
52 | X11 Forwarding | 54 | X11 Forwarding |
53 | -------------- | 55 | -------------- |