245
submitted 2 months ago by Blaze@lemmy.zip to c/linux@programming.dev
you are viewing a single comment's thread
view the rest of the comments
[-] possiblylinux127@lemmy.zip 0 points 2 months ago* (last edited 2 months ago)

Maybe it is time to move to something new

Also why does sshd run as root. I deal like ssh could use some least privilege

[-] frezik@midwest.social 10 points 2 months ago* (last edited 2 months ago)

When you log in to an ssh terminal for a shell, it has to launch the shell process as the desired user. Needs to be root to do that.

SSH has been around a long time. It's not perfect, but it's mostly validated. Anything new won't have that history.

[-] possiblylinux127@lemmy.zip 1 points 2 months ago

Can't it use built in OS mechanisms for that? Surely you could figure out a way to only give it permissions it needs. Maybe break it up into two separate processes.

[-] Sethayy@sh.itjust.works 1 points 2 months ago

That just sounds like root with extra steps (trying to implement OS security policies in a remote terminal utility)

[-] noxy@yiffit.net 9 points 2 months ago* (last edited 2 months ago)

Preliminary note: OpenSSH is one of the most secure software in the world; this vulnerability is one slip-up in an otherwise near-flawless implementation. Its defense-in-depth design and code are a model and an inspiration, and we thank OpenSSH's developers for their exemplary work.

[-] Mio@feddit.nu 1 points 2 months ago

Root because it use port 22. I think anything lower than port 1024 requires it. But if this is true, then you can try change the port it is listening to something higher than that.

this post was submitted on 01 Jul 2024
245 points (98.8% liked)

Linux

4966 readers
179 users here now

A community for everything relating to the linux operating system

Also check out !linux_memes@programming.dev

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

founded 1 year ago
MODERATORS