From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mp1 ([2001:41d0:2:4a6f::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by ms0.migadu.com with LMTPS id 2JTJCvIUz2AFdgEAgWs5BA (envelope-from ) for ; Sun, 20 Jun 2021 12:14:10 +0200 Received: from aspmx1.migadu.com ([2001:41d0:2:4a6f::]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)) by mp1 with LMTPS id qBh6BvIUz2CUJAAAbx9fmQ (envelope-from ) for ; Sun, 20 Jun 2021 10:14:10 +0000 Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by aspmx1.migadu.com (Postfix) with ESMTPS id AB941BE1F for ; Sun, 20 Jun 2021 12:14:09 +0200 (CEST) Received: from localhost ([::1]:32844 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1luuSu-0005KR-DX for larch@yhetil.org; Sun, 20 Jun 2021 06:14:08 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:45536) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1luuSp-0005II-FB for guix-patches@gnu.org; Sun, 20 Jun 2021 06:14:03 -0400 Received: from debbugs.gnu.org ([209.51.188.43]:49800) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1luuSo-0006oM-8Q for guix-patches@gnu.org; Sun, 20 Jun 2021 06:14:03 -0400 Received: from Debian-debbugs by debbugs.gnu.org with local (Exim 4.84_2) (envelope-from ) id 1luuSo-0005TK-5H for guix-patches@gnu.org; Sun, 20 Jun 2021 06:14:02 -0400 X-Loop: help-debbugs@gnu.org Subject: [bug#49129] [PATCH] services: openssh: Replace 'without-password' by 'prohibit-password'. Resent-From: Brice Waegeneire Original-Sender: "Debbugs-submit" Resent-CC: guix-patches@gnu.org Resent-Date: Sun, 20 Jun 2021 10:14:02 +0000 Resent-Message-ID: Resent-Sender: help-debbugs@gnu.org X-GNU-PR-Message: report 49129 X-GNU-PR-Package: guix-patches X-GNU-PR-Keywords: patch To: 49129@debbugs.gnu.org X-Debbugs-Original-To: guix-patches@gnu.org Received: via spool by submit@debbugs.gnu.org id=B.162418399920970 (code B ref -1); Sun, 20 Jun 2021 10:14:02 +0000 Received: (at submit) by debbugs.gnu.org; 20 Jun 2021 10:13:19 +0000 Received: from localhost ([127.0.0.1]:33113 helo=debbugs.gnu.org) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1luuS2-0005S4-40 for submit@debbugs.gnu.org; Sun, 20 Jun 2021 06:13:19 -0400 Received: from lists.gnu.org ([209.51.188.17]:48060) by debbugs.gnu.org with esmtp (Exim 4.84_2) (envelope-from ) id 1luuRx-0005Rt-DJ for submit@debbugs.gnu.org; Sun, 20 Jun 2021 06:13:12 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]:45214) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1luuRx-0004wi-6f for guix-patches@gnu.org; Sun, 20 Jun 2021 06:13:09 -0400 Received: from relay2-d.mail.gandi.net ([217.70.183.194]:62341) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1luuRu-00060n-TH for guix-patches@gnu.org; Sun, 20 Jun 2021 06:13:08 -0400 Received: (Authenticated sender: brice@waegenei.re) by relay2-d.mail.gandi.net (Postfix) with ESMTPSA id 9911640006 for ; Sun, 20 Jun 2021 10:13:03 +0000 (UTC) From: Brice Waegeneire Date: Sun, 20 Jun 2021 12:13:01 +0200 Message-Id: <20210620101301.16601-1-brice@waegenei.re> X-Mailer: git-send-email 2.31.1 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Received-SPF: pass client-ip=217.70.183.194; envelope-from=brice@waegenei.re; helo=relay2-d.mail.gandi.net X-Spam_score_int: -25 X-Spam_score: -2.6 X-Spam_bar: -- X-Spam_report: (-2.6 / 5.0 requ) BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: debbugs-submit@debbugs.gnu.org X-Mailman-Version: 2.1.18 Precedence: list X-BeenThere: guix-patches@gnu.org List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: guix-patches-bounces+larch=yhetil.org@gnu.org Sender: "Guix-patches" X-Migadu-Flow: FLOW_IN ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=yhetil.org; s=key1; t=1624184049; h=from:from:sender:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding:resent-cc: resent-from:resent-sender:resent-message-id:list-id:list-help: list-unsubscribe:list-subscribe:list-post; bh=+QOQOuqOwDd5YuR++Gg1qmxOdkYy+jK23+l7Zpvt6Pk=; b=nsySjENQjo0aT7zznj4tw+ZmYEcJ+RmpixW83K5voxvdYWbqIX3Wc26hIfGs2he6gfb+ga 9YOBm3pceLC2sTDAOV9tcOrWYs1QbeabY6q9nH2xG7FCtdgLw8uZOregqBgTa1rKoSvV/I 56+R211l1s6JHPEXx/C4Se3DsxbXvBa5qNIwWWfV/PtChexC9+RAkzaZCg32yhn7P4OI5+ jthmjujYP6IEEYyIx9Oe3CaMYgQe2LkCku1xjpEYZifipDOO8YOdexNG7p3bLqSSFVME// P3SKXQHNuzo00Kk3sznh1oyKrqYBI2yyfI0StRO1QuO3Ng1c7SDEoOnZaSQsNg== ARC-Seal: i=1; s=key1; d=yhetil.org; t=1624184049; a=rsa-sha256; cv=none; b=X9nvSfVPP095li7w77IbJDQfIxScgeItc2WkUHUpOnw/WHL7ij6BAKsn/Zciwgqwy2kRlL qYypcKqQ0NY4u9nFlgQmL5u42KKM6rSuersU81SxSQbIXFi7wKFjzKtPi7yD8vD1urpuoW H7NWL9+hPLhrrV3N18fezJDvIDgmfs7NTUJuP1XZaTBmdo2AaoWVqwVep4UiCVTwkAWfqf IfC269nP89gIz+lj43mJipDhyfCW+AyhKittXFKuwvzSHVQdyPvnLPmDwYJqCwVhAzNVkU O0Ni17scF4v7ZT4BzrieMNNMQFnRZa9g0P90wCS5y9u0oiVXHpuQaQRIc0APUg== ARC-Authentication-Results: i=1; aspmx1.migadu.com; dkim=none; spf=pass (aspmx1.migadu.com: domain of guix-patches-bounces@gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=guix-patches-bounces@gnu.org X-Migadu-Spam-Score: -1.43 Authentication-Results: aspmx1.migadu.com; dkim=none; dmarc=none; spf=pass (aspmx1.migadu.com: domain of guix-patches-bounces@gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=guix-patches-bounces@gnu.org X-Migadu-Queue-Id: AB941BE1F X-Spam-Score: -1.43 X-Migadu-Scanner: scn0.migadu.com X-TUID: RH5jlQhNuO6t For some time, OpenSSH's option 'PermitRootLogin' has deprecated the ambiguous argument 'without-password' with 'prohibit-password'. * doc/guix.texi (Network Services): Replace 'without-password' by 'prohibit-password'. * gnu/machine/digital-ocean.scm (guix-infect): Change system configuration to use 'prohibit-password'. * gnu/services/ssh.scm (openssh-configuration): Change comment to use 'prohibit-password'. (openssh-config-file): Add support for 'prohibit-password' to 'permit-root-login'. * gnu/tests/ganeti.scm (%ganeti-os): Replace 'without-password' by 'prohibit-password'. --- doc/guix.texi | 6 +++--- gnu/machine/digital-ocean.scm | 3 ++- gnu/services/ssh.scm | 6 ++++-- gnu/tests/ganeti.scm | 3 ++- 4 files changed, 11 insertions(+), 7 deletions(-) diff --git a/doc/guix.texi b/doc/guix.texi index efeb176e3d..66c6adc4f5 100644 --- a/doc/guix.texi +++ b/doc/guix.texi @@ -17070,7 +17070,7 @@ shell daemon, @command{sshd}. Its value must be an (service openssh-service-type (openssh-configuration (x11-forwarding? #t) - (permit-root-login 'without-password) + (permit-root-login 'prohibit-password) (authorized-keys `(("alice" ,(local-file "alice.pub")) ("bob" ,(local-file "bob.pub")))))) @@ -17104,7 +17104,7 @@ TCP port on which @command{sshd} listens for incoming connections. @item @code{permit-root-login} (default: @code{#f}) This field determines whether and when to allow logins as root. If @code{#f}, root logins are disallowed; if @code{#t}, they are allowed. -If it's the symbol @code{'without-password}, then root logins are +If it's the symbol @code{'prohibit-password}, then root logins are permitted but not with password-based authentication. @item @code{allow-empty-passwords?} (default: @code{#f}) @@ -29333,7 +29333,7 @@ cluster node that supports multiple storage backends, and installs the ;; Ganeti uses SSH to communicate between nodes. (service openssh-service-type (openssh-configuration - (permit-root-login 'without-password))) + (permit-root-login 'prohibit-password))) (service ganeti-service-type (ganeti-configuration diff --git a/gnu/machine/digital-ocean.scm b/gnu/machine/digital-ocean.scm index 82383a8c7c..d97c300d18 100644 --- a/gnu/machine/digital-ocean.scm +++ b/gnu/machine/digital-ocean.scm @@ -1,5 +1,6 @@ ;;; GNU Guix --- Functional package management for GNU ;;; Copyright © 2019 Jakob L. Kreuze +;;; Copyright © 2020 Brice Waegeneire ;;; ;;; This file is part of GNU Guix. ;;; @@ -256,7 +257,7 @@ cat > /etc/bootstrap-config.scm << EOF (service openssh-service-type (openssh-configuration (log-level 'debug) - (permit-root-login 'without-password)))) + (permit-root-login 'prohibit-password)))) %base-services))) EOF # guix pull diff --git a/gnu/services/ssh.scm b/gnu/services/ssh.scm index 1891db0487..1017510dd5 100644 --- a/gnu/services/ssh.scm +++ b/gnu/services/ssh.scm @@ -6,6 +6,7 @@ ;;; Copyright © 2019 Ricardo Wurmus ;;; Copyright © 2020 pinoaffe ;;; Copyright © 2020 Oleg Pykhalov +;;; Copyright © 2020 Brice Waegeneire ;;; ;;; This file is part of GNU Guix. ;;; @@ -288,7 +289,7 @@ The other options should be self-descriptive." ;; integer (port-number openssh-configuration-port-number (default 22)) - ;; Boolean | 'without-password + ;; Boolean | 'prohibit-password (permit-root-login openssh-configuration-permit-root-login (default #f)) ;; Boolean @@ -441,7 +442,8 @@ of user-name/file-like tuples." #$(match (openssh-configuration-permit-root-login config) (#t "yes") (#f "no") - ('without-password "without-password"))) + ('without-password "prohibit-password") ; deprecated + ('prohibit-password "prohibit-password"))) (format port "PermitEmptyPasswords ~a\n" #$(if (openssh-configuration-allow-empty-passwords? config) "yes" "no")) diff --git a/gnu/tests/ganeti.scm b/gnu/tests/ganeti.scm index ff853a7149..19c26b86dd 100644 --- a/gnu/tests/ganeti.scm +++ b/gnu/tests/ganeti.scm @@ -1,5 +1,6 @@ ;;; GNU Guix --- Functional package management for GNU ;;; Copyright © 2020 Marius Bakke . +;;; Copyright © 2020 Brice Waegeneire ;;; ;;; This file is part of GNU Guix. ;;; @@ -65,7 +66,7 @@ (service openssh-service-type (openssh-configuration - (permit-root-login 'without-password))) + (permit-root-login 'prohibit-password))) (service ganeti-service-type (ganeti-configuration -- 2.31.1