Comment by ahoka

6 months ago

It can't. Also there's nothing inherently wrong with ssh password auth.

Maybe you wanna check your systemd log once in a while. It begs to differ.

If ssh password out would be no problem, then why are so many APTs "wasting" their botnets with credentials stuffing?

Your assumption is wrong, and policies for key based auth eliminate the problem quite easily. Versus on the other hand: are you checking every colleague's password for length, charset, etc? All the time? On every server?

Probably not.

You might want to back those statements up.

  • Not parent, but see my sibling comment re: Docker. The issue is imo that Docker is very easy to misconfigure and gives you the wrong mental model of how security on Linux works.

    On SSH password auth: its secure if you use a long, random, not reused elsewhere password for every user. But it is also very easy to not do these things. SSH certs are just more convenient imo.

  • Using docker does not help in this specific case - if the attackers came via ssh, they will have root access as before, and if they come in through the application, they still control your application inside the container and can make it serve what they want.

    For ssh, the problem does not lie within password auth itself, but with weak passwords. A good password is more secure than a keypair on a machine whose files you can't keep private.