Date: Fri, 2 May 2003 16:45:54 +0700 From: =?Windows-1251?B?9fPl8PPq?= <anyher@ngs.ru> To: "Fedder Skovgaard" <fsk@maerskdata.dk> Cc: freebsd-questions@freebsd.org Subject: Re: Being root via ssl Message-ID: <176721945.20030502164554@ngs.ru> In-Reply-To: <OFAEF92425.1AC61264-ONC1256D1A.00311AA3-C1256D1A.0032A2DF@mdata.dk> References: <OFAEF92425.1AC61264-ONC1256D1A.00311AA3-C1256D1A.0032A2DF@mdata.dk>
next in thread | previous in thread | raw e-mail | index | archive | help
FS> What is the preferred way of doing this, and is it _really_ dangerous to
FS> allow root login via ssl ?
teoreticaly its much more insecure , because ssh *realy* can be
craced from the same segment of network , but if you works like
a ordinar user , and than do su root (or just su ) root password
is transmiting not in first bytes of data - if you works some
time like ordinar user.
only users in group 0 can su to root (by default) im think it's
preferred to login and after is su to root.
Also its prefired because you can't do somthing that will brake your system while
you an ordinar user ,it not 'fantom menace' :) , specialy when your
machine is serving some clients . You realy dont need in a
fullcontrol to read man pages , or using ports collection (till moment of
'make install' )
--
Best regards,
mailto:anyher@ngs.ru
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?176721945.20030502164554>
