Re: Allowing remote root login seems to be bad. Why? (SUMMARY)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



--- On Fri, 6/6/08, Bond Masuda <bond.masuda@xxxxxxxxxx> wrote:

> From: Bond Masuda <bond.masuda@xxxxxxxxxx>
> Subject: Re: Allowing remote root login seems to be bad. Why? (SUMMARY)
> To: secureshell@xxxxxxxxxxxxxxxxx
> Date: Friday, June 6, 2008, 4:17 AM
> Hari Sekhon wrote:
> > I am a little surprised people have not been talking
> about ssh-key-only 
> > logins (but then I didn't bother mentioning it
> until now either... ;-) )
> 
> In my experience, using public key authentication is often
> more of a 
> security risk, depending on the situation. If the remote
> machine that 
> holds the private key (and some store this with no password
> for 
> convenience) is compromised, they immediately have an open
> door into 
> your server. You may have no control how passwords are
> enforced, updates 
> are applied, or if any security is implemented on the
> remote end. 
> Setting up public key authentication, in effect extends
> your "trust 
> domain" to a server that may not be so trust worthy.
> To me, it makes 
> more sense to rely on security I can control. (which is
> often not the 
> case if it is some other user's office desktop or
> workstation)
> 
> -Bond

There are some good reasons to force key authentication.  You can set up some good rules in the authorized_keys file, and on a user-to-user basis.  Some examples:

from="pattern-list"
no-agent-forwarding
no-port-forwarding
no-pty
no-X11-forwarding
permitopen="host:port"



      

[Index of Archives]     [Open SSH Unix Development]     [Fedora Users]     [Fedora Desktop]     [Yosemite Backpacking]     [KDE Users]     [Gnome Users]

  Powered by Linux