Having 2 authentication steps, and proper logs, allows for good
user-tracking/management for those who are KNOWN to have root access. Making
them "su or su -" makes it easier to know WHO did what. That said, this
doesn't prevent malicious use. Something that has MAC and other ACLs would
be more proper. 

-- 
Austin Gonyou
Systems Architect, CCNA
Coremetrics, Inc.
Phone: 512-796-9023
email: [EMAIL PROTECTED] 

> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
> Sent: Tuesday, September 25, 2001 1:31 PM
> To: Edward Lewis
> Cc: [EMAIL PROTECTED]
> Subject: Re: Why restrict root logins?
> 
> 
> [ On Tuesday, September 25, 2001 at 11:59:45 (-0400), Edward 
> Lewis wrote: ]
> > Subject: Why restrict root logins?
> >
> > I have been asked about the rationale behind restricting 
> direct root logins
> > via SSH.  (There is a sshd configuration option on this.)  
> Is there a
> > document that lists the reason why this exists?
> 
> Because generally speaking the "root" account is a shared account, and
> without accountability to match system activities to a 
> real-world person
> there is no security (possible, by definition).
> 
> You don't really need to restrict root logins if only one person knows
> the root password (or other authentication token) since then you know
> who the real person is using the "root" account.
> 
> However there's some benefit percieved by some people in requiring two
> authentication steps to get to superuser access (i.e. normal 
> user login,
> followed by 'su').
> 
> -- 
>                                                       Greg A. Woods
> 
> +1 416 218-0098      VE3TCP      <[EMAIL PROTECTED]>     
> <[EMAIL PROTECTED]>
> Planix, Inc. <[EMAIL PROTECTED]>;   Secrets of the Weird 
> <[EMAIL PROTECTED]>
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
> 

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to