Comment 1 for bug 1798471

Revision history for this message
Mike Pontillo (mpontillo) wrote : Re: [2.5] Always enable SSH on ESXi deployments or provide an option to do so

Some questions:

 - In the kickstart file a root password is specified for the ESX host. I assume, then, that in order to configure ESX for the first time, one either connects to the ESX web interface with the root password, or "enlists" (not sure the correct term) the ESX instance into an existing vSphere server. Is that correct?

 - I assume it's possible (via the ESX web interface) for a user to manually enable SSH. Is that correct?

If both of the above assumptions are true, I feel that it's safest to disable SSH by default, given that it can easily be re-enabled. That is, given that ESX servers have SSH disabled by default, and complain loudly if that changes, I think it's safe to assume that VMware doesn't maintain the SSH service to ensure that it has applied the latest security updates. (Or even if it did, it's likely that customers will deploy a specific release of ESX for a long period of time and not update it.) That means that enabling SSH could significantly increase the attack surface of an ESX deployment.

I know it's counter-intuitive from a MAAS perspective, but it seems to me that leaving SSH disabled by default (and allowing an option to enable it at deployment time, if desired) is the safest bet for an ESX deployment.