> On Monday, 12 January 2015 10:06 PM, Milan Keršláger wrote: > No. It improves nothing. This is step backward. > It gaves bad signal to the user ("strong root password is not needed"). Wrong interpretation. > It does not mitigate the BF attack. The original and main reason was to > mitigate BF even "P J P <pjp@xxxxxxxxxxxxxxxxx>" told us here > that not. No! Again, intention is to keep malicious users from gaining 'root' access via BF attacks. It is quite similar to why we run services as non-root users, instead of root. If at all break-in happens, it is still a non-root user. > The PJP told us that this is like SELinux or firewal. But firewall block > all trafic. But SELinux does not allow to obey the rules it raises. And > "PermitRootLogin=no" still allows BF Which part of 'PermitRootLoing=yes|no' says anything about what to do with non-root account? It is not a mitigation for brute force attacks. The option merely says whether to allow remote root login or not. > (which is hard to prove as I demonstrated before because it will lead to use much > less quality passords for root and normal users too). That's a hypothesis. > If you really want to improve security and mitigate BF attacks against root, do this: > A) do not run SSHD by default That's a non-option. > B) install a script by default to bann repeated login failures > (there are many around here, just test them and ship one). MaxAuthTries option could help with that. --- Regards -Prasad http://feedmug.com -- devel mailing list devel@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/devel Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct