Because, if a hacker gets on one box that has a root key to another
machine, it's all over.
On Tue, 25 Sep 2001, Edward Lewis wrote:
> I have been asked about the rationale behind restricting direct root logins
> via SSH. (There is a sshd configuration option on this.) Is there a
> document that lists the reason why this exists?
>
> In absence of that, if folks want to contribute technical reasons why one
> should restrict root logins, I would appreaciate input. Since this might
> be a topic in which feelings run deep, off-list is probably better and I'll
> summarize.
>
> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
> Edward Lewis NAI Labs
> Phone: +1 443-259-2352 Email: [EMAIL PROTECTED]
>
> You fly too often when ... the airport taxi is on speed-dial.
>
> Opinions expressed are property of my evil twin, not my employer.
>
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
>
>
--
Rory Savage, Senior Systems Administrator
Nando Media: www.nandomedia.com
email: [EMAIL PROTECTED]
919-836-5987 (Office)
---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]