Re: how to react on ssh attacks?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Michael A. Peters wrote:

> 
> It's a known user ID on a system, and an incredibly powerful one.
> No one will have root access that doesn't have a regular user account as
> well, therefore, forcing remote root users to first log in as their
> regular user and then su to root prevents a known username that happens
> to be all powerful from being bute-forced.

The only problem I've found with this is that X applications fail after
using su. But it's OK if you only need to use text-based admin tools.

-- 
http://jonathan.rawle.org/



[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux