-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> From: Graeme Robinson [mailto:[EMAIL PROTECTED]]

> Not that we ever use the root account for remote administering do
> we?    

        To remotely log in as root?  No; I connect as a user and then su.

> One of the first things you will do in setting up a server is
> create a user account for yourself, set the shell for your account
> to /bin/bash and then give your account equivalent root sudo
> privileges in /etc/sudoers.  

        I'd agree with the first two steps, but the third seems like you'd
be back to the equivalent of just logging in as root.  A little
better, I guess, as an attacker would need to know what accout to try
to crack, but once they're in, it's just a matter of 'sudo rm -rf /".
 If you have to su, you also need the root password.  Of course, it's
entirely possible I'm missing something.

- -- 
Dan Brown, KE6MKS, [EMAIL PROTECTED]
"Since all the world is but a story, it were well for thee to buy the
more enduring story rather than the story that is less enduring."
 -- The Judgment of St. Colum Cille 

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.0.4

iQA/AwUBPLt+P36CI7gsQbX8EQKLngCg7JqF5yEWZG0dNwQstzosZCiFQkYAoNKO
uKM8O3jOMBwO5MgpYIvQxr+n
=+/gk
-----END PGP SIGNATURE-----


--
Please report bugs to [EMAIL PROTECTED]
Please mail [EMAIL PROTECTED] (only) to discuss security issues
Support for registered customers and partners to [EMAIL PROTECTED]
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
Archives by mail and http://www.mail-archive.com/devinfo%40lists.e-smith.org

Reply via email to