On Fri, Oct 13, 2017 at 5:57 AM, Walter Alejandro Iglesias <[email protected]
> wrote:

Perhaps the existence of PermitRootLogin  directive is redundant at this
point or
ought to be deprecated, and the docs should suggest  using other Option
directives?  :-)

Or..... how is this meant to provide additional functionality  above and
beyond  directives that
can be used to restrict  authentication types for all connections
regardless of login name?

                AuthenticationMethods publickey,keyboard-interactive

                Match User root
                      AuthenticationMethods publickey

The  [AuthenticationMethods]  directive can also specify that a
Non-Password based Method
must be used  PLUS a  Password-based method...  thus  avoiding the
possibility of an
unintentional backdoor through an .ssh/authorized_keys  key file,  by
making sure the root
password is always required,   And  reducing the likelihood that a SSH
secret key
is stolen and then used to surreptitiously login as root,     So.....

         AuthenticationMethods publickey password,keyboard-interactive

Can be seen as stronger security than   "PermitRootLogin prohibit-password"


There's no  "PermitRootLogin  require-BOTH-publickey-and-a-password"



> In sshd_config(5), to avoid confusion with PermitRootLogin options.
>
> Original:
>
>   If this option is set to *prohibit-password* or *without-password*,
>   password and keyboard-interactive authentication are disabled for
>   root.
>
> Proposed:
>
>   If this option is set to *prohibit-password* (renamed from
>   *without-password* to avoid ambiguity, both valid) only non
>   keyboard-interactive authentication (public-key, hostbased and GSSAPI)
>   is allowed for root.
>
>
--
-JH

Reply via email to