Hi franco,
thank you for your explanation and I understand the reason for that decision.
SSH is limited to ssh-keys, password login is not permitted.
My boxes are physical systems but located at customers place, so auto login is obviously no option.
That would be a nice solution (and root does not need direct remote access gui/ssh).
Additional use case:
Loading a customers configuration in a box without internet connection (no ntp server reachable).
Kind regards,
proctor
thank you for your explanation and I understand the reason for that decision.
Quote from: franco on July 18, 2025, 10:38:19 AMOne of the problems with disabled integrated authentication is that it downgrades password strength through SSH and for the console. Console is less risk because you need "physical" access, but the game changes in SSH password authentication which should be avoided.
SSH is limited to ssh-keys, password login is not permitted.
QuoteFor physical systems in server racks I enable auto console log in so I don't have to deal with this at all. The rack or the server room should provide enough protection. ;)
My boxes are physical systems but located at customers place, so auto login is obviously no option.
Quote from: Patrick M. Hausen on July 18, 2025, 10:44:18 AMEnforce 2FA for all administrators except root, which keeps password authentication, set an e.g. 40 character password and keep it somewhere safe for emergency access. Like failing time synchronisation.
That would be a nice solution (and root does not need direct remote access gui/ssh).
Additional use case:
Loading a customers configuration in a box without internet connection (no ntp server reachable).
Kind regards,
proctor