Date: Fri, 2 May 2003 16:45:54 +0700 From: =?Windows-1251?B?9fPl8PPq?= <anyher@ngs.ru> To: "Fedder Skovgaard" <fsk@maerskdata.dk> Cc: freebsd-questions@freebsd.org Subject: Re: Being root via ssl Message-ID: <176721945.20030502164554@ngs.ru> In-Reply-To: <OFAEF92425.1AC61264-ONC1256D1A.00311AA3-C1256D1A.0032A2DF@mdata.dk> References: <OFAEF92425.1AC61264-ONC1256D1A.00311AA3-C1256D1A.0032A2DF@mdata.dk>
next in thread | previous in thread | raw e-mail | index | archive | help
FS> What is the preferred way of doing this, and is it _really_ dangerous to FS> allow root login via ssl ? teoreticaly its much more insecure , because ssh *realy* can be craced from the same segment of network , but if you works like a ordinar user , and than do su root (or just su ) root password is transmiting not in first bytes of data - if you works some time like ordinar user. only users in group 0 can su to root (by default) im think it's preferred to login and after is su to root. Also its prefired because you can't do somthing that will brake your system while you an ordinar user ,it not 'fantom menace' :) , specialy when your machine is serving some clients . You realy dont need in a fullcontrol to read man pages , or using ports collection (till moment of 'make install' ) -- Best regards, mailto:anyher@ngs.ru
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?176721945.20030502164554>