how to react on ssh attacks?
Jonathan Rawle
gmane at jonathanrawle.co.uk
Wed Oct 26 23:54:53 UTC 2005
Michael A. Peters wrote:
>
> It's a known user ID on a system, and an incredibly powerful one.
> No one will have root access that doesn't have a regular user account as
> well, therefore, forcing remote root users to first log in as their
> regular user and then su to root prevents a known username that happens
> to be all powerful from being bute-forced.
The only problem I've found with this is that X applications fail after
using su. But it's OK if you only need to use text-based admin tools.
--
http://jonathan.rawle.org/
More information about the fedora-list
mailing list