On Wed, 2003-10-29 at 20:53, James Melin wrote: > Aside from being EXCEPTIONALLY dangerous, why do you want this?
Why do you think this is so dangerous? The only way to exploit that is through access to the virtual console of the machine. Access to any virtual console can be limited, and per virtual machine arranged with userid and password. I rather have this than a bunch of people who need to know the root password to shut down the penguin or recycle the network, let alone hardcoded passwords in automation. While the obvious reason for doing this is the automation that runs on that virtual console, another good reason imho is that systems staff do not need to find a root password when system administration is done by others. Rob