
This could be easily fixed by forcing the user at the first logon to change password. As for the floppy, good idea, but all of my machines (servers and desktops) are floppy-less, so it wouldn't work very well in my case. And using a CD-R with custom settings or so wouldn't be very convinient (I know, spelled it wrongBut I'm thinking of the total linux newbie who lives in a dorm with a direct connection to the internet. He/she doens't have a hardware firewall, has no idea about rootkits. Somehow he misses/ignores the step about seting the root password in the begining so he has an open ssh server with no password on the root account for the whole time he is doing a stage1 install.
Can't you hack the iso yourself? I don't have a clue about how the boot cd works but I'm sure it is documented somewhere. Mount the iso, set the rootpasswd to something only you know, setup the network and start sshd. Now burn it and boot from the cd and use your nice ssh connection.Cossins wrote:Hi there,
What are the pros and cons of having the LiveCD start sshd automatically and to make it not scramble the root password?
This would make it so much easier installing Gentoo on my new server, as I wouldn't have to connect monitor and keyboard to set things up...
Surely, there is a security risk... But how much sensitive data is really stored on a server about to install a new operating system?
It could be noted somewhere that if you want real security, you should change the root password immediately after logging in...
(the default password could be "gentoo" or something)
Thoughts?
- Simon
Last I checked the ssh daemon wasn't started automatically. How would you start it with no keyboard?Cossins wrote: This would make it so much easier installing Gentoo on my new server, as I wouldn't have to connect monitor and keyboard to set things up...
Couldn't this be used to set the password of root to gentoo or something and require him to change it at first login (through ssh or whatever)?If you wish to immediately expire an account's password, you can use the -e option. This in effect can force a user to change his/her password at the user's next login.
The livecd has an ssh server. It's the first thing it tells you about once you login and the simple command ismadchaz wrote:I voted no. but the real awnser from me would be yesno
Basicaly, having SSHD installed, but not started, on the live cd, would be interesting.
I know for me it's the very first thing I install. That way I can work remotly. However, having a standard root password is a BAD idea. A lot of people will just keep it. That makes for very weak security. It's not as if it is hard to change it yourself. It's even explained in the procedure how.
What I would like to see is a compromise. Have SSH installed, but we'd have to manualy start it. Say, with a simple command like startssh or something the like.
that way, we need minimum intervention on the machine itself then we can work remotly.
Code: Select all
/etc/init.d/sshd startCode: Select all
passwdWhat if someone else logged in first? It would only take a few seconds (if that) for an experienced hacker to set something in motion that would echo your password you set when you get around to loging in or whatever.HermesConrad wrote:Out of the passwd man:Couldn't this be used to set the password of root to gentoo or something and require him to change it at first login (through ssh or whatever)?If you wish to immediately expire an account's password, you can use the -e option. This in effect can force a user to change his/her password at the user's next login.
Uhm, then I think you have bigger problemspuggy wrote:What if someone else logged in first? It would only take a few seconds (if that) for an experienced hacker to set something in motion that would echo your password you set when you get around to loging in or whatever
Then it might as well always be set static and you just use it to login locally instead.MrWorf wrote:Btw, would it be possible to pickup on the fact that no keyboard is attached? I seem to remember that the kernel cries a little when no keyboard is present during boot. Now, if we could utilize this information, the livecd would then choose a preset password (gentoo or whatever, maybe specific for each release?)....
This makes no difference. If someone else managed to log in before you did then you'd still have your security compromised. The beeping would also be useless probably as most remote installs I suspect will be, errr, remote....and then FORCE the first login (via SSHd which was started automatically aswell since no keyboard was present) to change the password, and it should NOT allow empty passwords or the same, etc. Ofcourse, this would probably involve alot more than a simple change to the init scripts, but you get the best of both worlds me thinks.
As an added bonus, the computer should begin beeping if no network settings were picked up, to let you know that sshd is futile at this point.
/MrWorf - Just full of ideas today
Uhm, wouldn't that defeat the whole idea of remote logon/install? The difference with a remote install contra local is that when it is remote, the computer probably doesn't have a keyboard or screen. So a static password is less dangerous (but still not good security) than on a local install where someone could potentially do some harm.Puggy wrote:Then it might as well always be set static and you just use it to login locally instead.
The reason for the beeps was to provide a solution to "what if it doesn't pickup the network when booting?" question. And often, since you physically have to insert the CD somehow, you'd probably be able to hear the beeps. Or you would when you walked back to see why you couldn't logon remotely.Puggy wrote:This makes no difference. If someone else managed to log in before you did then you'd still have your security compromised. The beeping would also be useless probably as most remote installs I suspect will be, errr, remote.
I know the feeling, did that just some weeks agoJimbow wrote:I've got a 200 MHz P III that I run sans keyboard and screen. It is on a local net so I am not worried about badies cracking in. But now, if I want to boot off of the LiveCD (which is very handy on occasion) I've got to haul out a keyboard, monitor and mouse, clear off a space on my desk, etc.
If the password is preset there might as well be no password as it'll make no difference to the hacker. Hence there is no point in only using a static login for the remote install as long as the local interface is logged out on boot.MrWorf wrote:Uhm, wouldn't that defeat the whole idea of remote logon/install? The difference with a remote install contra local is that when it is remote, the computer probably doesn't have a keyboard or screen. So a static password is less dangerous (but still not good security) than on a local install where someone could potentially do some harm.Puggy wrote:Then it might as well always be set static and you just use it to login locally instead.
There isn't necessarily no keyboard.Ofcourse, when the password is preset, there should be NO local login, since there is no keyboard.
Fair enough.The reason for the beeps was to provide a solution to "what if it doesn't pickup the network when booting?" question. And often, since you physically have to insert the CD somehow, you'd probably be able to hear the beeps. Or you would when you walked back to see why you couldn't logon remotely.Puggy wrote:This makes no difference. If someone else managed to log in before you did then you'd still have your security compromised. The beeping would also be useless probably as most remote installs I suspect will be, errr, remote.![]()
That's not a bad idea, but you might as well just stick your key on the livecds main session, and while your there you might as well set the password,and enable sshd to boot on startup by default.One way to add more security is to somehow make the LiveCD a multisession one, first, you burn the ISO, then you add a second session where the required SSH key is. This way, you could have a remote install. You don't need a floppy nor any kind of loose security. When the LiveCD boots, if it finds the second session (or whatever), it should go into remote mode.
It's actually rather easyBut all in all, I doubt it will be worth the trouble
See above link.I know the feeling, did that just some weeks agoJimbow wrote:I've got a 200 MHz P III that I run sans keyboard and screen. It is on a local net so I am not worried about badies cracking in. But now, if I want to boot off of the LiveCD (which is very handy on occasion) I've got to haul out a keyboard, monitor and mouse, clear off a space on my desk, etc.![]()
I'm not sure if we mean the same thing. I meant that when in remote mode, there should be no local console at all.puggy wrote: If the password is preset there might as well be no password as it'll make no difference to the hacker. Hence there is no point in only using a static login for the remote install as long as the local interface is logged out on boot.
MrWorf wrote:One way to add more security is to somehow make the LiveCD a multisession one, first, you burn the ISO, then you add a second session where the required SSH key is. This way, you could have a remote install. You don't need a floppy nor any kind of loose security. When the LiveCD boots, if it finds the second session (or whatever), it should go into remote mode.
Okay, that would work too, if you have the means to do it. This will not work from ... ahem ... windowspuggy wrote:That's not a bad idea, but you might as well just stick your key on the livecds main session, and while your there you might as well set the password,and enable sshd to boot on startup by default.