Date: Tue, 24 Jul 2007 21:33:26 +1000 From: Norberto Meijome <freebsd@meijome.net> To: perryh@pluto.rain.com Cc: freebsd-questions@freebsd.org Subject: Re: connecting user root with ssh Message-ID: <20070724213326.5e8aa27d@localhost> In-Reply-To: <465d3e9e.uyoP2YaUttmVs6ON%perryh@pluto.rain.com> References: <11066.217.114.136.135.1180427946.squirrel@llca513-a.servidoresdns.net> <499c70c0705290145w309bd308u83f39f3791c5b3f@mail.gmail.com> <465C1D68.8000502@yahoo.gr> <465d3e9e.uyoP2YaUttmVs6ON%perryh@pluto.rain.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 30 May 2007 02:06:38 -0700 perryh@pluto.rain.com wrote: > * If "root" cannot log in remotely, a cracker has to guess three guess or brute force - so quite long random passwords (or ssh keys) are extremely recommendable. > things to obtain root access, instead of just one: > > + A valid username which is in the "wheel" group; > + That user's password; > + The root password. that is assuming, of course, that the user your just logged in with belongs to wheel. _________________________ {Beto|Norberto|Numard} Meijome "The only good bureaucrat is one with a pistol at his head. Put it in his hand and it's goodbye to the Bill of Rights." H.L. Mencken I speak for myself, not my employer. Contents may be hot. Slippery when wet. Reading disclaimers makes you go blind. Writing them is worse. You have been Warned.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20070724213326.5e8aa27d>