From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp12.migadu.com ([2001:41d0:306:2d92::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by ms9.migadu.com with LMTPS id WFGpDFRl7WSBHwAAauVa8A:P1 (envelope-from ) for ; Tue, 29 Aug 2023 05:26:12 +0200 Received: from aspmx1.migadu.com ([2001:41d0:306:2d92::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp12.migadu.com with LMTPS id WFGpDFRl7WSBHwAAauVa8A (envelope-from ) for ; Tue, 29 Aug 2023 05:26:12 +0200 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id 0772340767 for ; Tue, 29 Aug 2023 05:26:11 +0200 (CEST) Authentication-Results: aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=gmail.com header.s=20221208 header.b=P1P5QZ+G; spf=pass (aspmx1.migadu.com: domain of "bug-guix-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="bug-guix-bounces+larch=yhetil.org@gnu.org"; dmarc=fail reason="SPF not aligned (relaxed)" header.from=gmail.com (policy=none) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=yhetil.org; s=key1; t=1693279572; h=from:from:sender:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:resent-to:resent-from:resent-sender: resent-message-id:in-reply-to:in-reply-to:references:references: list-id:list-help:list-unsubscribe:list-subscribe:list-post: dkim-signature; bh=t6w6a/CyOVrx7yVCuAj9Qy4TdytwmEpWEFhJAjPJfW8=; b=NZWd+kOJYqblffUjTqP//0sQKCLcWGS2TOun7jkHZZDV6ktkUyFZVwG6f/LAn/dtlWH9lg VOZiMskNt78uBEjPcKCziyUdUC69KAkHTRmrep9mOlDWKY0/0Hj4Q4EHlXcyV7KBECFjX8 7Xnkh6vj2UTbaR2W7fKZjXZTGH8g8zZGHYGYOWigyw4UFaKcSQAbpnLdZJda8+al9EGgtv JLOaNrfOTUnIHWx6QRzNxa9+YKFmvhHFhJyHg+CP3OU8ZMRYiiZ3HvudcdOgrHUiCw6q9K A2xs8mXGNeN4xP++lb98Uh6uTsKCDP82rvfKAvYVftRNLX032zyuTc79kHqV9A== ARC-Authentication-Results: i=1; aspmx1.migadu.com; dkim=fail ("headers rsa verify failed") header.d=gmail.com header.s=20221208 header.b=P1P5QZ+G; spf=pass (aspmx1.migadu.com: domain of "bug-guix-bounces+larch=yhetil.org@gnu.org" designates 209.51.188.17 as permitted sender) smtp.mailfrom="bug-guix-bounces+larch=yhetil.org@gnu.org"; dmarc=fail reason="SPF not aligned (relaxed)" header.from=gmail.com (policy=none) ARC-Seal: i=1; s=key1; d=yhetil.org; t=1693279572; a=rsa-sha256; cv=none; b=QTMwf1lP14MQw4fBq2gWTfbnMS1dao777TBG+pVSV+YJ4lTasLwtVyYw+MnEmg2Vtjn5C3 Rw23EWFp+cGR0PU6tN+iV1b6ytkW9IVAOfJzJQV7EUgD66qij6/JlW0fbZ76QOwrCNFNxw Yo02yrXXy8wcSYCLbw9QUL6yqxSosWIj9GTBnohVcsu0Xb3cptxUVphfBNX9JXMA/91q6C AXShxjg/rv0TcR6V0Nd1w1iePW/+kS8WpsCS6uZwYQlDgX7mq3tbI/pXxzLezu6LZqDdF3 8ns36kfOHrcpfjTfYtxIf18MlqJXoVf63ARe+uAM7aq+E1yKM6ervNvyQpz9tA== Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1qapMc-0002yj-Mi; Mon, 28 Aug 2023 23:25:58 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1qapMa-0002xa-WD for bug-guix@gnu.org; Mon, 28 Aug 2023 23:25:57 -0400 Received: from debbugs.gnu.org ([2001:470:142:5::43]) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1qapMa-00045S-O5 for bug-guix@gnu.org; Mon, 28 Aug 2023 23:25:56 -0400 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1qapMh-0001sc-ER for bug-guix@gnu.org; Mon, 28 Aug 2023 23:26:03 -0400 Subject: bug#26695: openssh password-authentication? should be #f by default Resent-From: Maxim Cournoyer Original-Sender: "Debbugs-submit" Resent-To: bug-guix@gnu.org Resent-Date: Tue, 29 Aug 2023 03:26:03 +0000 Resent-Message-ID: Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: cc-closed 26695 X-GNU-PR-Package: guix X-GNU-PR-Keywords: To: Leo Famulari Cc: Christopher Allan Webber , 26695-done@debbugs.gnu.org Mail-Followup-To: 26695@debbugs.gnu.org, maxim.cournoyer@gmail.com, cwebber@dustycloud.org Received: via spool by 26695-done@debbugs.gnu.org id=D26695.16932795037088 (code D ref 26695); Tue, 29 Aug 2023 03:26:03 +0000 Received: (at 26695-done) by debbugs.gnu.org; 29 Aug 2023 03:25:03 +0000 Received: from localhost ([127.0.0.1]:49257 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1qapLi-0001qG-QZ for submit@debbugs.gnu.org; Mon, 28 Aug 2023 23:25:03 -0400 Received: from mail-qv1-xf29.google.com ([2607:f8b0:4864:20::f29]:58763) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1qapLg-0001pg-DJ for 26695-done@debbugs.gnu.org; Mon, 28 Aug 2023 23:25:01 -0400 Received: by mail-qv1-xf29.google.com with SMTP id 6a1803df08f44-64a5f9a165eso21426866d6.1 for <26695-done@debbugs.gnu.org>; Mon, 28 Aug 2023 20:24:53 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1693279488; x=1693884288; h=mime-version:user-agent:message-id:in-reply-to:date:references :subject:cc:to:from:from:to:cc:subject:date:message-id:reply-to; bh=t6w6a/CyOVrx7yVCuAj9Qy4TdytwmEpWEFhJAjPJfW8=; b=P1P5QZ+GxGYYlxpxuffwUjsKgIrfv/cZwoSCF7Qc0vry4dq+HwLgo3h36PpkQbmHVF dt9kX/+l9xd6UA1BdqUNhjl2W0ByiBev/TIlA4OZt8qBIiL0/+evSf48lEnj/R6cOv+v slLNC76uCYDFI1zFNQHOunZG92G78FI4dCg+bQdhKrgVPqNCDm0Z1erzFnAcQW9u5fzA gS3654oOa0Rk9VDFWJVIl+HGAx/ubpJsL3v5arvy5PuJetAXnjQ51MzIhmcMCSPj1EQe YxPGRosrghZ7YXy3hLGF63T0mVj+MxbFRUagkYrTmwBt2FDpQLXTkcMLGrLp4vXhO3sB xypA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1693279488; x=1693884288; h=mime-version:user-agent:message-id:in-reply-to:date:references :subject:cc:to:from:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=t6w6a/CyOVrx7yVCuAj9Qy4TdytwmEpWEFhJAjPJfW8=; b=PU9H3mkeMSA1niY0eI4vq+qjXC5r7TJF0LU4PYni+xLMU35OelJ03FaxNwR922m5Tw 6I6OtVcHVFeFdW3+CzVI0thtGt/IlnTgfNIsVtbqqTsHpNqh7G8nQx68mwygX8PgE6xI YkcnRJJAsBtvF9qdKo0owwRYdwpfYcEBn7r2B4oyPsbz2ks57SROsTjW7VolVDLpsAVQ GhuhXzWoFWQC/vlGiMLHdHy1I66IDdjuGKnysawS2pwxYE33kXbMelRLknvtbqmICwq+ q+tEVU5Jxfx8QNMAtZHn5DFotgejsKq1Q8zl6MHf+Hkq+qgYeG7fzM94ZilJriPInbMn ZB2A== X-Gm-Message-State: AOJu0Yyevg2DED5Tjfo2WUvB6u9V14C0VKOHG355n+OWLZceocoQkCgH I1Czsvrtt4dwp9ZZcURCF7Nx0xUV0ooZ0Q== X-Google-Smtp-Source: AGHT+IFjNLfRylGH+cNv6FLjDWi8OZC+HoInp3WxsgwoYz/aH7tl5jof9y/zaunUS42hb7MKS+u2pg== X-Received: by 2002:a05:6214:890:b0:626:290f:3e80 with SMTP id cz16-20020a056214089000b00626290f3e80mr25679833qvb.50.1693279487836; Mon, 28 Aug 2023 20:24:47 -0700 (PDT) Received: from hurd (dsl-10-132-204.b2b2c.ca. [72.10.132.204]) by smtp.gmail.com with ESMTPSA id y12-20020a0ce04c000000b00647290bd591sm3050441qvk.121.2023.08.28.20.24.47 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 28 Aug 2023 20:24:47 -0700 (PDT) From: Maxim Cournoyer References: <87k264tx8m.fsf@dustycloud.org> <20170428192834.GB6736@jasmine> Date: Mon, 28 Aug 2023 23:24:46 -0400 In-Reply-To: <20170428192834.GB6736@jasmine> (Leo Famulari's message of "Fri, 28 Apr 2017 15:28:34 -0400") Message-ID: <87jzteedj5.fsf@gmail.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/28.2 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list X-BeenThere: bug-guix@gnu.org List-Id: Bug reports for GNU Guix List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: bug-guix-bounces+larch=yhetil.org@gnu.org Sender: bug-guix-bounces+larch=yhetil.org@gnu.org X-Migadu-Country: US X-Migadu-Flow: FLOW_IN X-Migadu-Scanner: mx2.migadu.com X-Migadu-Spam-Score: 2.78 X-Spam-Score: 2.78 X-Migadu-Queue-Id: 0772340767 X-TUID: jY0FAVq6g6lH Hi, Leo Famulari writes: > On Fri, Apr 28, 2017 at 09:37:13AM -0500, Christopher Allan Webber wrote: >> Our default permits password authentication for the openssh service (and >> the others it seems) by default in Guix. This is somewhat dangerous >> because this is a much easier to break in this way, and some users might >> not assume the default is reasonably safe. If users really want >> password-authentication, they should turn it on explicitly. > > The upstream default is to allow password authentication (see > sshdconfig(5)). > > With the current GuixSD defaults, my understanding is that nobody will > be able to login remotely to a new GuixSD system with the default > openssh-service, unless they make the effort to insert the user's > password in their GuixSD declaration. Remote root login and empty > password login is disabled by default. > > So the current situation seems safe to me. Please let us know if you see > a hole. I agree with your assessment. I think there's probably more hurt than benefit in diverging from upstream's choice of defaults here. I'm thus closing this old forgotten report. -- Thanks, Maxim