Justin Ellison wrote:
> I have also heard this before, and it took a lot of pondering before I came
> up with my own answer - it's my own, not backed by anything:
>
> Think of brute force attacks. If someone were to start brute forcing ssh
> connections, they will obviously try to start with a user name of root. If
> you deny root access, they will first have to know a username that does have
> access, and then once they get in there, they would have to find a local
> exploit to get root access. Most script kiddies will give up way before
> that point.
>
> Anyone have any thoughts? Am I totally off base?
I that is exactly the reason I do this. Of course I also don't allow passwords
at all but I feel this gives me an extra layer of security in case of some
misconfiguration. I wish the standard rpms would come with root logins
disallowed so the update process would not leave me vulnerable at least for
this situation incase I forget to set the allowpasswords or whatever it is to
no.
I know that it is redundant and if I change one I will probably change the
other but I do make mistakes occationally :-)
Bret
_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list