Date: Mon, 22 Jan 2001 12:42:17 -0500 From: Peter Radcliffe <pir@pir.net> To: "freebsd-stable@FreeBSD.ORG" <freebsd-stable@FreeBSD.ORG> Subject: Re: ssh login Message-ID: <20010122124217.H14001@pir.net> In-Reply-To: <3A6C7007.134CD18F@powerusersbbs.com>; from tsikora@powerusersbbs.com on Mon, Jan 22, 2001 at 12:38:15PM -0500 References: <3A6B9008.88CCCE91@home.com> <20010122080422.A88843@citusc17.usc.edu> <3A6C64CE.DDA1F400@powerusersbbs.com> <20010122175500.O16921@wilbury.sk> <3A6C7007.134CD18F@powerusersbbs.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Ted Sikora <tsikora@powerusersbbs.com> probably said: > That was it. How can root be dangerous in ssh.. isn't that why it > exists? Or would using su be better? I usually use ssh to remotely > administer the servers. Log in as a normal user and su to root. It's the same reason most UNIXes don't allow remote logins as root; if you allow passworded root logins you only have one password between a remote user and root access. If you make them su (the correct way, in most people's minds) then you have two passwords between them and root. Personally I restrict ssh access even further. P. -- pir pir@pir.net pir@net.tufts.edu To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010122124217.H14001>