Configuring a user should not configure root's authorized_keys
Bug #1871879 reported by
Florian Apolloner
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
cloud-init |
Expired
|
Wishlist
|
Unassigned |
Bug Description
When `ssh_authorized
If `disable_root` is set to true it leaks the actual configured username: "Please login as the user XYZ rather than the user root." With `disable_root` set to false you can login.
It would be great if there were a way to actually disable root and not touch it at all. I fully understand that the info message is useful for new users, but it would be great to have a way to leave root alone.
description: | updated |
description: | updated |
To post a comment you must log in.
It would be great!
Now I do it like: ssh/authorized_ keys
runcmd:
- rm -f /root/.
But a proper option would be better.