One more thing to add: since root is the goal of many hacks, if you
never use the root account, a sudden login to root signles 'You are
hacked'. A root kit, in particular, attacks in order to gain root
access.

Ben Ricker
System Administrator
Wellinx.com

On Tue, 2001-09-25 at 13:31, Greg A. Woods wrote:
> [ On Tuesday, September 25, 2001 at 11:59:45 (-0400), Edward Lewis wrote: ]
> > Subject: Why restrict root logins?
> >
> > I have been asked about the rationale behind restricting direct root logins
> > via SSH.  (There is a sshd configuration option on this.)  Is there a
> > document that lists the reason why this exists?
> 
> Because generally speaking the "root" account is a shared account, and
> without accountability to match system activities to a real-world person
> there is no security (possible, by definition).
> 
> You don't really need to restrict root logins if only one person knows
> the root password (or other authentication token) since then you know
> who the real person is using the "root" account.
> 
> However there's some benefit percieved by some people in requiring two
> authentication steps to get to superuser access (i.e. normal user login,
> followed by 'su').
> 
> -- 
>                                                       Greg A. Woods
> 
> +1 416 218-0098      VE3TCP      <[EMAIL PROTECTED]>     <[EMAIL PROTECTED]>
> Planix, Inc. <[EMAIL PROTECTED]>;   Secrets of the Weird <[EMAIL PROTECTED]>
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
> 



---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to