On Fri, 17 May 2019 at 14:02, Chris Adams <li...@cmadams.net> wrote:

> Once upon a time, Stephen John Smoogen <smo...@gmail.com> said:
> > So a lot of sites have set up that you remotely kickstart a system and
> then
> > ansible in as root with the rest of the configurations. It is the biggest
> > reason we have been keeping this as active for a long time.  You are
> > breaking all those configs with a 'oh you can just login on a local
> > console'. That kickstart may not have any of that..  and the last thing a
> > sysadmin wants when they are building 4000 nodes somewhere is find out
> that
> > they need to add another 20 steps to their post..
>
> Well, I'd assume before building 4000 nodes, they'd test the kickstart
> (I test mine extensively on VMs before using on a real box).  It isn't
> "another 20 steps" - either a sed one-liner to allow root or a mkdir and
> a echo to add an SSH key (which you'd probably do anyway if you're doing
> the rest with Ansible).
>
>
Look its Friday. I don't drink, I don't smoke, and I am trying to cut
swearing. All that leaves me is a nice can of hyperbole.

You are right, 1-4 lines is what might be needed to do things.


> > Make it a predefined kickstart thing they can do so all they have to do
> is
> > add a line in it that says
> >
> > ssh_remote --user=<account> --keyfile=<url> --yesIwantrootandIknowitsbad
>
> If this is the desired path, I'd go with a couple of additional
> arguments to existing directives:
>
>   --enablerootssh (for rootpw or maybe auth?)
>   --sshkey (for both rootpw and user directives)
>
>
Yeah.. --sshkey is a better name than --keyfile
and --enablerootssh is better than --yesIwantrootandIknowitsbad


> No matter if this proposal is done, having an --sshkey option would be
> nice, especially for Ansible use.
>
> I think this OpenSSH change to follow upstream (and many other OS)
> config is a good and overdue thing.
>

I am not disagreeing... but having been the person to do such security
changes in the past.. it usually pisses of the people deploying the
software enough to jump to something completely different. It always gets
taken as 'You are more worried about security than usability' and a general
feeling of disrespect to the sysadmins stuck with coming up with the change
have 0 time to actually do that work. After 30+ years of being a security
jerk.. I am just trying to say 'look people we can do better. if someone
needs to get this done.. we should at least make it easier for them to do
so in way that is clear to an auditor later.' [Ah there goes another can of
hyperbole.. ]



> --
> Chris Adams <li...@cmadams.net>
> _______________________________________________
> devel mailing list -- devel@lists.fedoraproject.org
> To unsubscribe send an email to devel-le...@lists.fedoraproject.org
> Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
> List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
> List Archives:
> https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
>


-- 
Stephen J Smoogen.
_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: https://getfedora.org/code-of-conduct.html
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org

Reply via email to