From owner-freebsd-hackers Sat Dec 6 15:09:58 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.7/8.8.7) id PAA22394 for hackers-outgoing; Sat, 6 Dec 1997 15:09:58 -0800 (PST) (envelope-from owner-freebsd-hackers) Received: from seidata.com (seidata.com [206.160.242.33]) by hub.freebsd.org (8.8.7/8.8.7) with ESMTP id PAA22378 for ; Sat, 6 Dec 1997 15:09:53 -0800 (PST) (envelope-from mike@seidata.com) Received: from localhost (mike@localhost) by seidata.com (8.8.8/8.8.5) with SMTP id SAA09604; Sat, 6 Dec 1997 18:09:55 -0500 (EST) Date: Sat, 6 Dec 1997 18:09:55 -0500 (EST) From: Mike To: Alex cc: John-Mark Gurney , Jaye Mathisen , Jim Bryant , ircadmin@shellnet.co.uk, freebsd-hackers@FreeBSD.ORG Subject: Re: Telnet Root access In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-hackers@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk On Fri, 5 Dec 1997, Alex wrote: > Actually it doesn't really even prevent that. Su just adds more > detailed logging of the attempts, which are more likely (IMO) to draw > attention. Keep in mind that only users in group wheel will be able to su... So, while not completely preventing this, it greatly limits *who* can brute force root to those people you trust enough to allow in the wheel group. // Mike // SEI Data Network Services, Inc.