it's not just adding a line at runtime. it's the openssh maintainers maintaining an odd codepath and testing it at each release and answering questions about the configuration, etc. On Thu, Jun 27, 2024 at 3:00 PM Henry Qin <hq6@xxxxxxxxxxxxxxx> wrote: > > I would like to understand your opinion a little more deeply. > > Are you suggesting that it's easier to (prepare the container and add a line at runtime) compared to (add a line to an sshd config at runtime)? The latter scenario would be the case if the patch is merged. > > Or did you mean that it's easier to prepare the container than to implement a correct patch into sshd to enable the option in the first place? > > If the patch is merged, then nobody has to prepare any containers a priori to enable this functionality. They just need to install sshd and create a config file whenever they need it, no root required. > > If the patch isn't merged, then anyone who wants to use this functionality has to prepare a container (unless they have root at runtime). They would then additionally have to create a config. > > ~Henry > > On Thu, Jun 27, 2024 at 2:49 PM Peter Moody <mindrot@xxxxxxxx> wrote: >> >> i'm not a maintainer, but my personal opinion is that it's probably >> easier to prepare a container with this pam configuration >> >> On Thu, Jun 27, 2024 at 2:26 PM Henry Qin <hq6@xxxxxxxxxxxxxxx> wrote: >> > >> > Thanks for the pointer! >> > I played around with PamServiceName set to 'sshd_disable_auth' and got it working with the minimum contents below in the file /etc/pam.d/sshd_disable_auth. >> > >> > auth required pam_permit.so >> > account required pam_permit.so >> > session required pam_permit.so >> > >> > Thus, this does indeed enable disabling authentication. >> > >> > Unfortunately, as far as I can tell, only root can create files in /etc/pam.d in most default system configurations. >> > Moreover, it is somewhat common to disallow root in an actual deployed environment. >> > >> > That means that this approach is infeasible when running sshd as an ordinary user, both generally and in deployed environments, unless the container or deployed VM already has a pam configuration file such as /etc/pam.d/sshd_disable_auth deployed with it. >> > >> > Thus, I'm still interested in your opinions on the proposed patch, which would grant more flexibility to ordinary users, and allow ad hoc usage in deployed scenarios without having to prepare a container with a bespoke pam configuration file. >> > >> > ~Henry >> > >> > On Thu, Jun 27, 2024 at 10:58 AM Peter Moody <mindrot@xxxxxxxx> wrote: >> >> >> >> see pam_permit(8) >> >> >> >> >> >> On Thu, Jun 27, 2024 at 10:37 AM Henry Qin <hq6@xxxxxxxxxxxxxxx> wrote: >> >> > >> >> > When I looked at `man pam_unix`, I did not see any obvious options that >> >> > would >> >> > cause ssh to authenticate without prompting for a password at all, short of >> >> > setting an empty password which is similar to PermitEmptyPasswords option. >> >> > >> >> > However, I am not very familiar with the internals of PAM, so pointers to >> >> > documentation would be greatly appreciated. >> >> > >> >> > Also, I think adding a single line to sshd_config is simpler for most users >> >> > to >> >> > do correctly than configuring an alternate PAM stack without breaking their >> >> > primary sshd setup, which is why I think the patch may still be useful. >> >> > >> >> > On Thu, Jun 27, 2024 at 7:57 AM Carson Gaspar <carson@xxxxxxxxxx> wrote: >> >> > >> >> > > On 6/26/2024 9:34 PM, Henry Qin wrote: >> >> > > > Hi folks, >> >> > > > >> >> > > > I've recently started to work on a patch for openssh that introduces a >> >> > > new >> >> > > > option to disable authentication. >> >> > > > I'd like to explain why I think this might be generally useful, and >> >> > > solicit >> >> > > > opinions on whether such a patch would be acceptable to the maintainers >> >> > > as >> >> > > > a pull request. >> >> > > >> >> > > Why not just use a different PAM stack? The new release allows >> >> > > specifying the stack name. This should do what you want with no code >> >> > > changes using Password / KbdInteractive AuthN. >> >> > > >> >> > > -- >> >> > > >> >> > > Carson >> >> > > >> >> > > _______________________________________________ >> >> > > openssh-unix-dev mailing list >> >> > > openssh-unix-dev@xxxxxxxxxxx >> >> > > https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev >> >> > > >> >> > _______________________________________________ >> >> > openssh-unix-dev mailing list >> >> > openssh-unix-dev@xxxxxxxxxxx >> >> > https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev _______________________________________________ openssh-unix-dev mailing list openssh-unix-dev@xxxxxxxxxxx https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev