Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 20 Feb 1998 23:04:56 -0500
From:      "mlucas@verio.net" <mlucas@verio.net>
To:        Doug White <dwhite@resnet.uoregon.edu>
Cc:        questions@FreeBSD.ORG, isp@FreeBSD.ORG
Subject:   Re: Books on security
Message-ID:  <199802201109.LAA12759@sunoco.rust.net>
In-Reply-To: <Pine.BSF.3.96.980218113342.13769L-100000@gdi.uoregon.edu>
References:  <873ehh41z3.fsf@devnull.ruhr.de>

next in thread | previous in thread | raw e-mail | index | archive | help
>> S/key is vulnerable to session hijacking, so ssh may be a better
>> choice.  If you use rdist, ssh has the additional advantage that it
>> allows root to do run it while plain rsh won't.
>
>If you enable that option :)  All my installs of SSH don't allow root
>logins.

The vanilla install of ssh in the ports directory does allow root logins
(at least, on my systems).

How can this be turned off?

Thanks,
ml


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-isp" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199802201109.LAA12759>