John Holland <jotih...@gmail.com> writes:

>>> shot. It can't be any worse of a C.F. than the ayufan builds with its
>>> pre-allocated user 1000.
>> 
>> Although having a preallocated user 1000 is the standard "Debian Way", the 
>> objective being that you can telnet (later SSH) in using that user and then  
>> sudo su  to get root (fouled up on some versions that don't add user 1000 to 
>> sudoers). For quite a long time 
>
> The same effect can be achieved by supplementing the user in question
> with the group sudo. With that there is no need to edit sudoers.

Presumably the system had a root password set at first install.  That is
what normally determines whether the first user created at install time
is added to the sudo group or not -- having no root password provokes a
user with sudo access, so that there is still some way of becoming root.

If you're doing it by hand, just run this as root (assuming a user 'phil'):

  adduser phil sudo

As for the question of remote root ssh access -- by default in the
debian ssh package that is now only allowed using keys, rather than
password, so you need to copy your .pub over to:

  /root/.ssh/authorized_keys

on the target system to get in as root.

Cheers, Phil.
-- 
|)|  Philip Hands  [+44 (0)20 8530 9560]  HANDS.COM Ltd.
|-|  http://www.hands.com/    http://ftp.uk.debian.org/
|(|  Hugo-Klemm-Strasse 34,   21075 Hamburg,    GERMANY

Attachment: signature.asc
Description: PGP signature

Reply via email to