-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
password expiry vs ssh keys and accessibility during failure #19
Comments
If you have access, you can see some commentary at https://github.com/18F/DevOps/issues/148 |
It looks like we are already blocking password logins: https://github.com/fisma-ready/ubuntu-lts/blob/master/files/ubuntu/etc/ssh/sshd_config#L52 |
Right, but this affects user accounts which have a password set, even when you login via a public key. It's happened to me on two of my boxes too -- very frustrating. |
@konklone can we prevent users from setting passwords? I think that we talked about this before... |
I'm not sure. Probably we could make |
Please remember there is adduser and useradd(1) and they do the same thing in different ways. I use the latter generally. useradd -m jane -s /bin/bash. There's another issue discussing some of this related to chsh being broken. There are other, useful & relevant details there (iirc; it was August, so..). |
This just bit me again, in the form of silently broken cronjobs for analytics.usa.gov. The I believe this can be fixed by changing the
I believe if we change this to Identified through this source, which says that most distros don't even enable this. It doesn't happen for my |
I can't see the harm of having other users set up the way the edit: provided we can ensure they aren't using passwords. Obviously, setting their passwords to not expire Breaks The Rules. |
@janearc Is there a setting to disallow passwords (or to make |
From @janearc
I can't shell into the machine anymore. This is A Big Deal. When I give myself an account on a new machine, I make my own user look something like this:
jane:*:1001:1001:jane avriette:/home/jane:/bin/bash
And I install an ssh key. Thereafter, I don't worry about it. I started this practice when I worked at NOAA and we had incessant dictionary/fuzz attacks on our ssh daemons from various Asian countries. I decided that I was just not comfortable using any password I myself could remember, given that if I could remember it, there was a scheme behind it, and that scheme was guessable.
If you look at John the Ripper's wordfiles, in fact, you see a lot of these sorts of things. Like a mapping for "yrlnry" to "telnet". Various ciphers for "l33tsp34k" and the like.
Which is to say passwords are, in my mind, pretty worthless. Accordingly, I disable password authentication entirely in the ssh daemons I manage, and insist on users logging in with ssh keys.
This machine is now unusable to me; the original
ubuntu
user cannot log in for the same reason,jane
cannot log in, and there is no password that will work as the "current unix password."My understanding of this is that I will have to terminate the instance, mount its volume elsewhere on a new machine (I am not even sure how to go about doing this with LVM and so forth), with a password, and get back to work. By definition this "new" setup is less secure, and is going to cost me a lot of time when I could have been doing my job.
Surely there is a way around this? With the STIGs we were able to have an exception to the password complexity policy by mandating use of ssh keys.
The text was updated successfully, but these errors were encountered: