John Holland <jotih...@gmail.com> writes: >>> shot. It can't be any worse of a C.F. than the ayufan builds with its >>> pre-allocated user 1000. >> >> Although having a preallocated user 1000 is the standard "Debian Way", the >> objective being that you can telnet (later SSH) in using that user and then >> sudo su to get root (fouled up on some versions that don't add user 1000 to >> sudoers). For quite a long time > > The same effect can be achieved by supplementing the user in question > with the group sudo. With that there is no need to edit sudoers.
Presumably the system had a root password set at first install. That is what normally determines whether the first user created at install time is added to the sudo group or not -- having no root password provokes a user with sudo access, so that there is still some way of becoming root. If you're doing it by hand, just run this as root (assuming a user 'phil'): adduser phil sudo As for the question of remote root ssh access -- by default in the debian ssh package that is now only allowed using keys, rather than password, so you need to copy your .pub over to: /root/.ssh/authorized_keys on the target system to get in as root. Cheers, Phil. -- |)| Philip Hands [+44 (0)20 8530 9560] HANDS.COM Ltd. |-| http://www.hands.com/ http://ftp.uk.debian.org/ |(| Hugo-Klemm-Strasse 34, 21075 Hamburg, GERMANY
signature.asc
Description: PGP signature