From owner-freebsd-security Thu Jan 20 1:30:20 2000 Delivered-To: freebsd-security@freebsd.org Received: from hotmail.com (f129.law7.hotmail.com [216.33.237.129]) by hub.freebsd.org (Postfix) with SMTP id 337ED153CA for ; Thu, 20 Jan 2000 01:30:18 -0800 (PST) (envelope-from jslat@hotmail.com) Received: (qmail 18540 invoked by uid 0); 20 Jan 2000 09:30:17 -0000 Message-ID: <20000120093017.18539.qmail@hotmail.com> Received: from 129.250.32.103 by www.hotmail.com with HTTP; Thu, 20 Jan 2000 01:30:17 PST X-Originating-IP: [129.250.32.103] From: "NoCoN FLiC" To: cjc@cc942873-a.ewndsr1.nj.home.com, jonf@revelex.com Cc: freebsd-security@FreeBSD.ORG Subject: Re: ssh. Date: Thu, 20 Jan 2000 09:30:17 GMT Mime-Version: 1.0 Content-Type: text/plain; format=flowed Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org > >And someone who breaks in can easily fake that email. > >My personal solution (I know you are all dying for it)? > >Make sure root's .ssh directory is watched _very_ closely by >Tripwire. Setup Tripewire to use read-only media (e.g. write >protected floppy). >-- For what need, would one have to even remotely Logon to the root account, my advice to to not even have a ~/root/.ssh to begin with. to me it's about as silly as ~/root/.rhosts. ~NoCoNFLiC~ ______________________________________________________ Get Your Private, Free Email at http://www.hotmail.com To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message