Skip to content

Commit 4c98baa

Browse files
authored
Merge pull request #272 from SUSE:tbazant-dolomite-ssh-login-bsc#1217734
Added info about enabling password-based root SSH login (bsc#1217734)
2 parents 3c02e7f + e5c0df8 commit 4c98baa

2 files changed

Lines changed: 45 additions & 63 deletions

File tree

tasks/alp-considerations-before-deployment.xml

Lines changed: 14 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -20,43 +20,32 @@
2020
<title>Considerations before &productnameshort; deployment</title>
2121
</info>
2222
<para>
23-
This section introduces tips and suggestions that need to be considered
24-
before or during the deployment procedure.
23+
This section introduces tips and suggestions that need to be considered before or during the
24+
deployment procedure.
2525
</para>
2626
<section xml:id="alp-pre-deployment-considerations-root-ssh-login">
2727
<title>&rootuser; SSH login</title>
2828
<para>
29-
By default, &rootuser; SSH login in &productnameshort; is permitted only
30-
by using the SSH key. &rootuser; SSH login with password is prohibited.
31-
We recommend creating an unprivileged user that you can use to access the
32-
installed system and then enable &rootuser; SSH login.
33-
</para>
34-
<para condition="alp-deployment-agama-interactive">
35-
You can create an unprivileged user account during the installation
36-
process in the &alp-installer; environment.
37-
</para>
38-
<para condition="alp-deployment-rawdisk">
39-
You can create an unprivileged user account on the first boot by using
40-
the &ignition; tool.
41-
</para>
42-
<para condition="alp-deployment-all">
43-
Depending on the installation method, you can create an unprivileged user
44-
account either during the installation process in the &alp-installer;
45-
environment, or on the first boot by using the &ignition;/&combustion;
46-
tools.
29+
By default, &rootuser; SSH login in &productnameshort; is permitted only by using the SSH
30+
key. &rootuser; SSH login with password is prohibited. We recommend creating an unprivileged
31+
user that you can use to access the installed system and then enable &rootuser; SSH login.
4732
</para>
4833
<tip>
4934
<para>
50-
Creating an unprivileged user during system installation is useful for
51-
logging in to the &cockpit; Web interface. Find more details in
35+
<phrase condition="alp-deployment-agama-interactive">You can create an unprivileged user
36+
account during the installation process in the &alp-installer; environment.</phrase>
37+
<phrase condition="alp-deployment-rawdisk">You can create an unprivileged user account on
38+
the first boot by using the &ignition; tool.</phrase> Creating an unprivileged user during
39+
system installation is useful for logging in to the &cockpit; Web interface as well. Find
40+
more details in
5241
<link xlink:href="https://documentation.suse.com/alp/dolomite/html/cockpit-alp-dolomite/index.html"/>.
5342
</para>
5443
</tip>
5544
<tip>
5645
<para>
57-
See <xref linkend="alp-post-deploy-enable-root-ssh-login"/> for details
58-
on installing <package>openssh-server-config-rootlogin</package>
59-
manually after the system is deployed.
46+
For more details on enabling the password-based &rootuser; SSH login after the
47+
&productnameshort; deployment, refer to
48+
<xref linkend="alp-post-deploy-enable-root-ssh-login"/>.
6049
</para>
6150
</tip>
6251
</section>

tasks/alp-post-deployment-considerations.xml

Lines changed: 31 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,8 @@
2020
<title>Post-deployment considerations</title>
2121
<abstract>
2222
<para>
23-
This article includes important information and tasks that you need to
24-
consider after you successfully deploy &productname;.
23+
This article includes important information and tasks that you need to consider after you
24+
successfully deploy &productname;.
2525
</para>
2626
</abstract>
2727
</info>
@@ -30,9 +30,8 @@
3030
<section xml:id="alp-post-deploy-full-disk-encryption-password">
3131
<title>Change encryption password</title>
3232
<para>
33-
During the &productnameshort; deployment, you entered a password that
34-
is used for disk encryption. To change the password, run the following
35-
command:
33+
During the &productnameshort; deployment, you entered a password that is used for disk
34+
encryption. To change the password, run the following command:
3635
</para>
3736
<screen>&prompt.root;fdectl passwd</screen>
3837
</section>
@@ -42,8 +41,8 @@
4241
Without a TPM chip, you need to enter the encryption password to decrypt the disk on each
4342
&productnameshort; boot.
4443
</para>
45-
<para condition="alp-deployment-agama-interactive;alp-deployment-agama-automated">On
46-
systems that have a TPM 2.0 chip, &productnameshort; deployed with the &alp-installer;
44+
<para condition="alp-deployment-agama-interactive;alp-deployment-agama-automated">
45+
On systems that have a TPM 2.0 chip, &productnameshort; deployed with the &alp-installer;
4746
installer supports the automatic protection of the LUKS volume with a TPM device. The
4847
requirement is that the machine must use the &uefisecboot; enabled. If the &alp-installer;
4948
installer detects a TPM 2.0 chip and &uefisecboot;, it creates a secondary LUKS key. On the
@@ -62,17 +61,15 @@
6261
<section xml:id="alp-post-deploy-selinux">
6362
<title>&selnx;</title>
6463
<para>
65-
Security-Enhanced Linux (&selnx;) is a security framework that increases
66-
system security by defining access controls for applications, processes
67-
and files on the file system.
64+
Security-Enhanced Linux (&selnx;) is a security framework that increases system security by
65+
defining access controls for applications, processes and files on the file system.
6866
</para>
6967
<para>
7068
&productnameshort; ships with &selnx; enabled and set to the restrictive
71-
<emphasis>enforce</emphasis> mode for increased security. The enforce
72-
mode can lead to processes or workloads not behaving correctly because
73-
the default policy may be too strict. If you observe such unexpected
74-
issues, set &selnx; to the <emphasis>permissive</emphasis> mode that does
75-
not enforce &selnx; policies but still logs offenses against them called
69+
<emphasis>enforce</emphasis> mode for increased security. The enforce mode can lead to
70+
processes or workloads not behaving correctly because the default policy may be too strict.
71+
If you observe such unexpected issues, set &selnx; to the <emphasis>permissive</emphasis>
72+
mode that does not enforce &selnx; policies but still logs offenses against them called
7673
<emphasis>Access Vector Rules</emphasis> (AVCs).
7774
</para>
7875
<para>
@@ -82,27 +79,25 @@
8279
<tip>
8380
<para>
8481
To set &selnx; to the permissive mode permanently, edit
85-
<filename>/etc/selinux/config</filename> and update it to include the
86-
following line:
82+
<filename>/etc/selinux/config</filename> and update it to include the following line:
8783
</para>
8884
<screen>SELINUX=permissive</screen>
8985
</tip>
9086
<important>
9187
<para>
92-
If you entered an &selnx; permissive mode, you need to relabel your
93-
system until it is back in a good state. The reason is that the
94-
permissive mode allows you to reach states that are not reachable
95-
otherwise. To relabel the system, run the following command and reboot
96-
the system:
88+
If you entered an &selnx; permissive mode, you need to relabel your system until it is back
89+
in a good state. The reason is that the permissive mode allows you to reach states that are
90+
not reachable otherwise. To relabel the system, run the following command and reboot the
91+
system:
9792
</para>
9893
<screen>
9994
&prompt.root;touch /etc/selinux/.autorelabel
10095
&prompt.root;reboot
10196
</screen>
10297
</important>
10398
<para>
104-
To monitor AVCs, search the Audit log and &systemd; journal for log
105-
messages similar to the following one:
99+
To monitor AVCs, search the Audit log and &systemd; journal for log messages similar to the
100+
following one:
106101
</para>
107102
<screen>
108103
type=AVC msg=audit(1669971354.731:25): avc: denied { create } \
@@ -122,28 +117,27 @@ tcontext=system_u:system_r:modemmanager_t:s0 tclass=qipcrtr_socket permissive=0
122117
</para>
123118
<screen>&prompt.root;ausearch -m avc,user_avc,selinux_err -i</screen>
124119
<para>
125-
If such messages appear while using the application that did not behave
126-
correctly when &selnx; was set to the enforce mode, the policies are too
127-
restrictive and need updating. You can help to fine-tune &selnx; policies
128-
by creating a bug report at
120+
If such messages appear while using the application that did not behave correctly when
121+
&selnx; was set to the enforce mode, the policies are too restrictive and need updating. You
122+
can help to fine-tune &selnx; policies by creating a bug report at
129123
<link xlink:href="https://bugzilla.suse.com/enter_bug.cgi?classification=SUSE%20ALP%20-%20SUSE%20Adaptable%20Linux%20Platform"/>.
130124
Specify <literal>Basesystem</literal> as a component, include the word
131-
<literal>&selnx;</literal> in the bug subject, and attach the gathered
132-
unique lines that include AVCs together with reproduction steps.
125+
<literal>&selnx;</literal> in the bug subject, and attach the gathered unique lines that
126+
include AVCs together with reproduction steps.
133127
</para>
134128
</section>
135129
<section xml:id="alp-post-deploy-enable-root-ssh-login">
136-
<title>Enabling &rootuser; SSH login</title>
130+
<title>Enabling password-based &rootuser; SSH login</title>
137131
<para>
138-
&rootuser; login via SSH is not permitted in &productnameshort; by
139-
default for security reasons. To enable it, you have the following
132+
By default, &rootuser; SSH login in &productnameshort; is permitted only by using the SSH
133+
key. &rootuser; SSH login with password is prohibited. To enable it, you have the following
140134
options:
141135
</para>
142136
<itemizedlist>
143137
<listitem>
144138
<para>
145-
install the <package>openssh-server-config-rootlogin</package>
146-
package and reboot the system.
139+
install the <package>openssh-server-config-rootlogin</package> package and reboot the
140+
system.
147141
</para>
148142
<screen>
149143
&prompt.root;<command>transactional-update pkg in openssh-server-config-rootlogin</command>
@@ -152,9 +146,8 @@ tcontext=system_u:system_r:modemmanager_t:s0 tclass=qipcrtr_socket permissive=0
152146
</listitem>
153147
<listitem>
154148
<para>
155-
Add a file containing the snippet <literal>PermitRootLogin
156-
yes</literal> in the <filename>/etc/sshd/sshd_config.d/</filename>
157-
directory and reboot, for example:
149+
Add a file containing the snippet <literal>PermitRootLogin yes</literal> in the
150+
<filename>/etc/sshd/sshd_config.d/</filename> directory and reboot, for example:
158151
</para>
159152
<screen>
160153
&prompt.root;echo 'PermitRootLogin yes' &gt;&gt; /etc/sshd/sshd_config.d/root_login_config

0 commit comments

Comments
 (0)