This is for accounting purposes.  When users login as root you cannot
tell who it was.  If my machine is the only one that can login as root
then I know it was either me or a user that had to su to root.  Also I
use ssh keys so no passwords are sent from my machine and it makes it
much easier to spread config files.

Richard Nghiem

On Fri, 2002-11-08 at 14:42, Jon Etkins wrote:
> >On Fri, Nov 08, 2002 at 10:00:58AM -0800, Richard Nghiem wrote:
> >> 
> >> I have restricted root login to all my machines through ssh by setting
> >> "PermitRootLogin no".  I do most of my work as root and distribute
> >> configs files through scp to the correct places.  Currently I have to su
> >> -l after I login as myself.
> 
> Perhaps I'm missing something, but what does this achieve?  You still have
> to pass the root password, and the channel is secured before you even send
> the login name, so how is it any more secure to do this after you've logged
> in than at the initial login?
> 
> Curious,
>   Jon Etkins
>   Austin, TX
> 
> 
> 
> -- 
> redhat-list mailing list
> unsubscribe mailto:redhat-list-request@;redhat.com?subject=unsubscribe
> https://listman.redhat.com/mailman/listinfo/redhat-list




-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@;redhat.com?subject=unsubscribe
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to