Re: how to react on ssh attacks?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2005-10-26 at 19:54, Jonathan Rawle wrote:
> Michael A. Peters wrote:
> 
> > 
> > It's a known user ID on a system, and an incredibly powerful one.
> > No one will have root access that doesn't have a regular user account as
> > well, therefore, forcing remote root users to first log in as their
> > regular user and then su to root prevents a known username that happens
> > to be all powerful from being bute-forced.
> 
> The only problem I've found with this is that X applications fail after
> using su. But it's OK if you only need to use text-based admin tools.

Are you using the command:  su - or just su?

X apps should work just fine.  They do here.



[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux