John Summerfield wrote:
If you have a dozen public keys in there, how do you know whose key was used, and that was done? I quite like the idea of locking root's account
The normal practice is the Unix world is to disallow ssh logins to root ... root users must log in under a user account and su or sudo to root. -- Jack J. Woehr # I run for public office from time to time. It's like http://www.well.com/~jax # working out at the gym, you sweat a lot, don't get http://www.softwoehr.com # anywhere, and you fall asleep easily afterwards. ---------------------------------------------------------------------- For LINUX-390 subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO LINUX-390 or visit http://www.marist.edu/htbin/wlvindex?LINUX-390
