From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp2 ([2001:41d0:2:4a6f::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by ms11 with LMTPS id Xn7uMwKky1+VWwAA0tVLHw (envelope-from ) for ; Sat, 05 Dec 2020 15:15:14 +0000 Received: from aspmx1.migadu.com ([2001:41d0:2:4a6f::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp2 with LMTPS id iA5JLwKky1+UTgAAB5/wlQ (envelope-from ) for ; Sat, 05 Dec 2020 15:15:14 +0000 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id 86FC89404FD for ; Sat, 5 Dec 2020 15:15:14 +0000 (UTC) Received: from localhost ([::1]:44626 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1klZHF-0002xA-87 for larch@yhetil.org; Sat, 05 Dec 2020 10:15:13 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]:34388) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1klZH4-0002vH-Et for bug-guix@gnu.org; Sat, 05 Dec 2020 10:15:02 -0500 Received: from debbugs.gnu.org ([209.51.188.43]:36449) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1klZH4-0004pj-75 for bug-guix@gnu.org; Sat, 05 Dec 2020 10:15:02 -0500 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1klZH4-0002A4-1U for bug-guix@gnu.org; Sat, 05 Dec 2020 10:15:02 -0500 X-Loop: help-debbugs@gnu.org Subject: bug#44808: Default to allowing password authentication on leaves users vulnerable Resent-From: Ludovic =?UTF-8?Q?Court=C3=A8s?= Original-Sender: "Debbugs-submit" Resent-CC: bug-guix@gnu.org Resent-Date: Sat, 05 Dec 2020 15:15:01 +0000 Resent-Message-ID: Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: followup 44808 X-GNU-PR-Package: guix X-GNU-PR-Keywords: security To: Maxim Cournoyer Received: via spool by 44808-submit@debbugs.gnu.org id=B44808.16071812848256 (code B ref 44808); Sat, 05 Dec 2020 15:15:01 +0000 Received: (at 44808) by debbugs.gnu.org; 5 Dec 2020 15:14:44 +0000 Received: from localhost ([127.0.0.1]:47992 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1klZGl-000296-Tg for submit@debbugs.gnu.org; Sat, 05 Dec 2020 10:14:44 -0500 Received: from eggs.gnu.org ([209.51.188.92]:44374) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1klZGk-00028s-HD for 44808@debbugs.gnu.org; Sat, 05 Dec 2020 10:14:42 -0500 Received: from fencepost.gnu.org ([2001:470:142:3::e]:46929) by eggs.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1klZGf-0004hR-8H; Sat, 05 Dec 2020 10:14:37 -0500 Received: from [2a01:e0a:1d:7270:af76:b9b:ca24:c465] (port=58522 helo=ribbon) by fencepost.gnu.org with esmtpsa (TLS1.2:RSA_AES_256_CBC_SHA1:256) (Exim 4.82) (envelope-from ) id 1klZGe-0005di-Mz; Sat, 05 Dec 2020 10:14:37 -0500 From: Ludovic =?UTF-8?Q?Court=C3=A8s?= References: <878sat3rnn.fsf@dustycloud.org> <874klgybbs.fsf@zancanaro.id.au> <87im9w2gjt.fsf@dustycloud.org> <87im9nmr5u.fsf@gmail.com> X-URL: http://www.fdn.fr/~lcourtes/ X-Revolutionary-Date: 15 Frimaire an 229 de la =?UTF-8?Q?R=C3=A9volution?= X-PGP-Key-ID: 0x090B11993D9AEBB5 X-PGP-Key: http://www.fdn.fr/~lcourtes/ludovic.asc X-PGP-Fingerprint: 3CE4 6455 8A84 FDC6 9DB4 0CFB 090B 1199 3D9A EBB5 X-OS: x86_64-pc-linux-gnu Date: Sat, 05 Dec 2020 16:14:35 +0100 In-Reply-To: <87im9nmr5u.fsf@gmail.com> (Maxim Cournoyer's message of "Sun, 29 Nov 2020 22:58:53 -0500") Message-ID: <87eek45lpg.fsf@gnu.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list X-BeenThere: bug-guix@gnu.org List-Id: Bug reports for GNU Guix List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: 44808@debbugs.gnu.org Errors-To: bug-guix-bounces+larch=yhetil.org@gnu.org Sender: "bug-Guix" X-Migadu-Flow: FLOW_IN X-Migadu-Spam-Score: -2.80 Authentication-Results: aspmx1.migadu.com; dkim=none; dmarc=pass (policy=none) header.from=gnu.org; spf=pass (aspmx1.migadu.com: domain of bug-guix-bounces@gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=bug-guix-bounces@gnu.org X-Migadu-Queue-Id: 86FC89404FD X-Spam-Score: -2.80 X-Migadu-Scanner: ns3122888.ip-94-23-21.eu X-TUID: zyZZ0w9O/v0+ Hi! Maxim Cournoyer skribis: >>> I'm on board with what you're proposing, and I think Guix should >>> default to the more secure option, but I'm not sure that an=20 >>> "average user" (whatever that means for Guix's demographic) would >>> expect that password authentication is disabled by default. >> >> That's fair... I think that >> "[ ] Password authentication? (insecure)" >> would be sufficient as an option. How do others feel? > > I'm +1 on disabling password access out of the box; especially since > Guix System makes it easy to authorize SSH keys at installation time. > We'd have to see if it breaks any of our system tests, but I doubt so. Agreed. There are several ways to do that: 1. Have the installer emit an =E2=80=98openssh-configuration=E2=80=99 tha= t explicitly disables password authentication. 2. Change the default value of the relevant field in . #2 is more thorough but also more risky: people could find themselves locked out of their server after reconfiguration, though this could be mitigated by a news entry. Thoughts? Ludo=E2=80=99.