From owner-freebsd-questions@FreeBSD.ORG Wed Jul 27 18:20:54 2005 Return-Path: X-Original-To: freebsd-questions@freebsd.org Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 07EB816A41F for ; Wed, 27 Jul 2005 18:20:54 +0000 (GMT) (envelope-from freebsd-questions-local@be-well.ilk.org) Received: from mail28.sea5.speakeasy.net (mail28.sea5.speakeasy.net [69.17.117.30]) by mx1.FreeBSD.org (Postfix) with ESMTP id B3F0643D46 for ; Wed, 27 Jul 2005 18:20:53 +0000 (GMT) (envelope-from freebsd-questions-local@be-well.ilk.org) Received: (qmail 20659 invoked from network); 27 Jul 2005 18:20:53 -0000 Received: from dsl092-078-145.bos1.dsl.speakeasy.net (HELO be-well.ilk.org) ([66.92.78.145]) (envelope-sender ) by mail28.sea5.speakeasy.net (qmail-ldap-1.03) with SMTP for ; 27 Jul 2005 18:20:53 -0000 Received: by be-well.ilk.org (Postfix, from userid 1147) id 999CE2A; Wed, 27 Jul 2005 14:20:52 -0400 (EDT) Sender: lowell@be-well.ilk.org To: cartman_step1@spymac.com References: <20050727165310.DF8125C0040@webmail3.spymac.net> From: Lowell Gilbert Date: 27 Jul 2005 14:20:52 -0400 In-Reply-To: <20050727165310.DF8125C0040@webmail3.spymac.net> Message-ID: <44y87srtyz.fsf@be-well.ilk.org> Lines: 15 User-Agent: Gnus/5.09 (Gnus v5.9.0) Emacs/21.3 MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: freebsd-questions@freebsd.org Subject: Re: sshd and pam X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 27 Jul 2005 18:20:54 -0000 [Message reformatted.] writes: > yes i'm logging in as root , now i have understand , cause i can log > in as a normal user . But then it's possible to log in as root , so > i can administrate remotely the machine on the lan? su(8). [personally, I'm fond of sudo, which is in the ports] Letting root log in directly leaves you with no audit trail, and a single point of failure in your security scheme. You can configure sshd to let root log in, but I don't generally advise it for a network on the Internet.