![]() |
Re: SSH and root access
Quote:
The most secure option is to use public/private key authentication for the user account (as described in the thread I linked earlier) and disable logins on the root account (you can still sudo to root from the user account). |
Re: SSH and root access
^
| | Paranoiac ;p edit: After you've used ssh-copy-id, you can then remove the password of user Do this as root: usermod -L user Lazy way of transfering keys.. |
Re: SSH and root access
Sorry, a bit of a noob, but wondering about why a user password weakens everything, and where would you even use it since there isn't a GDM or anything like that (which btw would be pretty nice). Also, if you change your root password and then disable root login, will it ask for a password when you sudo gainroot? Thanks a lot, I appreciate it.
|
Re: SSH and root access
Quote:
Also if you are not typing in a password, neither someone looking over your shoulder nor a keylogger running on your system or attached to a keyboard cable or sniffing bluethooth signals will allow an attacker to gain access. So whether you set this up depends on your degree of security required but it is a pretty good trade-off between more security and ease of logins down the road vs. a little bit of up-front pain in getting it all configured right. |
| All times are GMT. The time now is 14:48. |
vBulletin® Version 3.8.8