update password selection advice
closes: #1064617, #998408, #868869, #656509
This gets rid of the outdated advice about password selection and renewals, and ensures that people know what to expect if they leave the root password blank.
Having tried various wordings in #1064617 we seem to have arrived at something that's generally acceptable.
Merge request reports
Activity
- Resolved by Holger Wansing
Yeah, I cannot remember either -- it used to just lock you out (forcing one to do the
init=/bin/sh
trick), but ISTR seeing rumours that one could use the password of a sudo-er.That definitely would need to be confirmed before such a change of advice.
The problem is that the account is not really locked, in that one can still log in to it using ssh, with a key, once configured. That made me think that saying the account was locked might produce false expectations. I've tried various wordings like "password based logins will not be allowed", but I've not found one I like much.
new screenshot here: https://openqa.debian.net/tests/185979#step/passwords/1
Also, I note that !6 is of course entangled with this
added 1 commit
- 386d8eaf - fixup! fixup! root password advice: recommend none, or long
I note that Fedora has done stuff regarding locked-root and rescue, where the discussion was reported by LWN:
https://lwn.net/Articles/879272/
and it seems like they got to a point that they're happy with:
https://fedoraproject.org/wiki/Changes/FixRescueMode
apparently by relying on a package
systemd-rescue-defaults
that implements their required behaviour -- I've not looked at that to see what it does yet though.Meanwhile, systemd has apparently added the ability to specify
SYSTEMD_SULOGIN_FORCE
as a kernel command line option, which change is included in version 254 (so this is now in testing).Adding that to the kernel command line has the same effect as setting SYSTEMD_SULOGIN_FORCE=1, which in turn sets the
--force
option forsulogin
, provoking the behaviour where having a locked root will give you a shell with no password required.That in effect is just streamlining the
init=/bin/sh
trick, since one already had no security if grub is allowing the kernel commandline to be edited, but it does suggest to me that if we are to allow locked root (as we do), then we should set --force by default (as per !6), and then suggest that people that are upset by that either provide a root password, or configure GRUB to prevent editing the commandline, or probably both.Describing those implications in a few sentences within the installer seems like it's probably not going to work, so we should probably have it all documented (on the wiki, say) and refer to it.
Also, I imagine there is a full spectrum of opinion about whether we should recommend setting or not setting a root password in the first place, so perhaps this is a case where we ought to go through a bout of consensus building on debian-devel before actually applying a change.
I've attempted to draft a truth-table of scenarios related to
{ locked-root + SYSTEMD_SULOGIN_FORCE=1 }
- a condition I'm referring to asfail-open
.added 8 commits
-
386d8eaf...94784ce8 - 3 commits from branch
installer-team:master
- 11e78caf - root password advice: recommend none, or long
- af4d931d - DO NOT MERGE THIS COMMIT - FOR TESTING ONLY
- eb40e604 - fixup! root password advice: recommend none, or long
- 56af726a - fixup! fixup! root password advice: recommend none, or long
- 829e83d3 - fixup! fixup! fixup! root password advice: recommend none, or long
Toggle commit list-
386d8eaf...94784ce8 - 3 commits from branch