On 2005-02-04 01:04, Gert Cuykens <[EMAIL PROTECTED]> wrote: > On Fri, 04 Feb 2005 00:05:34 +0000, Chris Hodgins > <[EMAIL PROTECTED]> wrote: > True but the point is without the ssh root enabled there is nothing > you can do about it to stop them if they change your user password
What user password? You are using SSH keys, as many have noted in earlier posts of the thread, right? :P Seriously now. What gave you the crazy idea that having local access as an unprivileged user means that automatically you are also root? Effort is *still* needed. Effort that the average Joe Random Cracker is _NOT_ going to spend. You may also want to consider than having SSH enabled for root means there is only ONE step at becoming root from any remote location. Having to SSH as a user first, with the right combination of SSH keys and passwords, and then use su(1) with yet another password is at least one more step. Why is the first, 1-step procedure safer than the second? - Giorgos _______________________________________________ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to "[EMAIL PROTECTED]"