Because, if a hacker gets on one box that has a root key to another
machine, it's all over.

On Tue, 25 Sep 2001, Edward Lewis wrote:

> I have been asked about the rationale behind restricting direct root logins
> via SSH.  (There is a sshd configuration option on this.)  Is there a
> document that lists the reason why this exists?
>
> In absence of that, if folks want to contribute technical reasons why one
> should restrict root logins, I would appreaciate input.  Since this might
> be a topic in which feelings run deep, off-list is probably better and I'll
> summarize.
>
> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
> Edward Lewis                                                NAI Labs
> Phone: +1 443-259-2352                      Email: [EMAIL PROTECTED]
>
> You fly too often when ... the airport taxi is on speed-dial.
>
> Opinions expressed are property of my evil twin, not my employer.
>
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
>
>

-- 
Rory Savage, Senior Systems Administrator
Nando Media: www.nandomedia.com
email: [EMAIL PROTECTED]
919-836-5987 (Office)



---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to