Am Freitag, 6. Juli 2001 12:19 schrieb Juha Jäykkä:
> > > (Put the public key in the .authorized_keys file for the root user)
> > > TUrn on RSA/DSA authentication and 'allow root login'
> >
> > One word of warning aboce would allow logging in using root password as
> > well
>
> I distrust allowing root logins from anywhere but local console(s)
> or non-modem gettys i.e. from anywhere over the not-owned-by-me cable.
> Any other ideas? Or is it really safe to allow root logins to sshd?
As already stated by someone else in this thread: Just create another user
(say, root1) with UID==0 and GID==0.
No need for direct root logins over the net. Although it should be much more
secure when using SSH compared to say, telnet I would feel uncomfortable,
because direct root login usually means, that you do not know WHO actually
got root when he logs on. SSH to normal user, and the su - root1 at least
tells you in the logs which user account opened the root session... I like to
know what's going on on my systems.
> It is just an old rule of thumb that root must never log on over the
> wire but that may be old news from times of telnet - never had any
> need of root logins over the wire until perhaps now.
--
Patrick Dreker
---------------------------------------------------------------------
> Is there anything else I can contribute?
The latitude and longtitude of the bios writers current position, and
a ballistic missile.
Alan Cox on [EMAIL PROTECTED]
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]