I'm not sure we can cover all possible "dangerous configurations". How
about a warning when a config option set in one config file is being
overridden elsewhere? I think that would be more valuable.

** Changed in: openssh (Ubuntu)
       Status: New => Triaged

** Changed in: openssh (Ubuntu)
   Importance: Undecided => Low

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/2088217

Title:
  Feature request, can we distro-patch sshd to emit warnings on
  dangerous configurations?

Status in openssh package in Ubuntu:
  Triaged

Bug description:
  Hello, recently the change to the sshd .d "drop-in" configuration
  format has been causing problems like people being surprised to find
  password authentication is enabled
  https://news.ycombinator.com/item?id=42133181

  I propose that it would be useful to patch sshd to log some settings
  at startup, to bring these potentially dangerous choices more
  visibility:

  - password authentication
  - empty password authentication
  - authenticationmethods
  - usepam
  - weak ciphers, kex, macs
  - hostbased authentication
  - permituserenvironment
  - agent forwarding
  - x11 forwarding / xauth

  I'm not sure if we should only log things that deviate from our
  intended configuration or we ought to just log things regardless. (eg,
  telling users "UsePAM is enabled" without any context might encourage
  some of them to disable UsePAM in an attempt to silence a message. So
  maybe silence on 'normal' or 'expected' or 'encouraged' settings is
  the better approach?)

  Thanks

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/2088217/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to