You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It appears there must be a scheduled job on servers to remove the frappe user authorized_keys in favour of using the root user for all management via ssh and ansible.
This is not a great security policy in general and is dangerous if people are unaware and install their keys under the frappe user for emergency purposes.
You could install your own user on each server, but in a large deployment this is not feasible.
I also suggest you deploy UFW on every server to match the AWS security group, with a ufw limit ... rule for rate limiting ssh and for defence in depth.
It appears there must be a scheduled job on servers to remove the frappe user
authorized_keys
in favour of using the root user for all management via ssh and ansible.This is not a great security policy in general and is dangerous if people are unaware and install their keys under the frappe user for emergency purposes.
You could install your own user on each server, but in a large deployment this is not feasible.
I also suggest you deploy UFW on every server to match the AWS security group, with a
ufw limit ...
rule for rate limiting ssh and for defence in depth.The text was updated successfully, but these errors were encountered: