Subject: re: sshd Change: PermitRootLogin = no
To: None <itojun@iijlab.net>
From: matthew green <mrg@eterna.com.au>
List: tech-security
Date: 09/01/2001 11:09:18
do you really want to change the DEFAULT behavior, or do you happy with
changing sshd.conf locally? i don't see your point. if you believe
secure shell protocol is secure enough, it should be okay to set
PermitRootLogin to yes. if there's any buffer overrun or other
vulnerability, root privilege will get compromized anyways regardless
from PermitRootLogin. what kind of middle ground are you aiming for?
the issue isn't about whether ssh is secure enough for not. it's about
being *consistent* within our own set of tools.
until ssh was integrated into netbsd, it was virtually impossible for
anyone to login as root except on the console, until that ability was
configured by the sysadmin. ie:
- add users
- add users to group wheel (or remote all entries from group
wheel)
- tell users root password.
and still they could only access root via a physical console or after
having already authenticated themselves. when ssh was integrated, all
that one needs is for sshd to be enabled and the root password to be
known. this *totally* changes the NetBSD default. and that's why it
has been changed to not permit root login. *not* ssh vs. anything else
but *self consistency in NetBSD*.
.mrg.