On Wed, 2003-10-29 at 20:53, James Melin wrote:
> Aside from being EXCEPTIONALLY dangerous, why do you want this?

Why do you think this is so dangerous? The only way to exploit that is
through access to the virtual console of the machine. Access to any
virtual console can be limited, and per virtual machine arranged with
userid and password. I rather have this than a bunch of people who need
to know the root password to shut down the penguin or recycle the
network, let alone hardcoded passwords in automation.

While the obvious reason for doing this is the automation that runs on
that virtual console, another good reason imho is that systems staff do
not need to find a root password when system administration is done by
others.

Rob

Reply via email to