I think it is much more a policy of not being root to avoid issues of
generally doing things as root than it is to prevent an attacker from
reaching the system.  By default, the images have no ssh password login,
and the attacker would only see this message if they had access to the
correct private keys.

If you want to change the behavior, it can be done via cloud-config.  Simply 
add the following cloud config syntax:
#cloud-config
disable_root: False

** Changed in: ubuntu-on-ec2
   Importance: Undecided => Wishlist

** Changed in: ubuntu-on-ec2
       Status: New => Won't Fix

** Also affects: cloud-init (Ubuntu)
   Importance: Undecided
       Status: New

** Changed in: cloud-init (Ubuntu)
       Status: New => Won't Fix

** Changed in: ubuntu-on-ec2
       Status: Won't Fix => Invalid

-- 
Root logins are crippled
https://bugs.launchpad.net/bugs/608958
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to