John Summerfield wrote:

If you have a dozen public keys in there, how do you know whose key was
used, and that was done?

I quite like the idea of locking root's account

The normal practice is the Unix world is to disallow ssh logins to root ...
root users must log in under a user account and su or sudo to root.

--
Jack J. Woehr            # I run for public office from time to time. It's like
http://www.well.com/~jax # working out at the gym, you sweat a lot, don't get
http://www.softwoehr.com # anywhere, and you fall asleep easily afterwards.

----------------------------------------------------------------------
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390

Reply via email to