Well, I stumbled on this anomaly and it looks like others have too where you can 'shoot yourself'. Get locked out and not be able to get back in. And so far, there is no recovery, except logging in as root. There are way too many shoddy tutorials on the web that lure users into pulling the trigger. "sudo su" then down the page "xstart" BAM

I'd prefer to have more control over my guns rather than to have them go off unintentionally.

Of course, change the Pi password and create a root password. Both should be strong. Don't think I advised differently? Actually am tired of helping people who did not take the simplest precautions right up front.

KEN;

perhaps you could advise the new Pi user just how to protect themselves.... definitely NOT a popular subject on the web

73
Den
On 2/16/2017 11:08 AM, Jason KG4WSV wrote:
On Feb 16, 2017, at 9:19 AM, Den <[email protected]> wrote:

I'll let you explore how to create a root password, which I recommend. 
Obviously those with more knowledge think we commoners, and the owner of the 
Pi, should not use.
Well, the problem was that you shot yourself in the foot by running something 
as root. Maybe they're onto something.

sudo is configured on by default for the pi user. Use of sudo instead of using 
a full root shell (su or sudo bash) or even worse logging in a root is 
considered best practice for security reasons. Using sudo allows minimal 
privilege escalation to accomplish a task and consequently minimizes risk.

If your pi is to be exposed to the internet, or maybe even on a home network, 
the passwords _should_ be changed for both the pi and root users. Default 
passwords are extremely insecure - there are days when I see over 10k brute 
force login attempts against a dozen or so systems, where attackers are looking 
for me and my users to rely on default or dumb passwords.

-j

_______________________________________________
Xastir mailing list
[email protected]
http://xastir.org/mailman/listinfo/xastir


_______________________________________________
Xastir mailing list
[email protected]
http://xastir.org/mailman/listinfo/xastir

Reply via email to