how to react on ssh attacks?

Jonathan Rawle gmane at jonathanrawle.co.uk
Wed Oct 26 23:54:53 UTC 2005


Michael A. Peters wrote:

> 
> It's a known user ID on a system, and an incredibly powerful one.
> No one will have root access that doesn't have a regular user account as
> well, therefore, forcing remote root users to first log in as their
> regular user and then su to root prevents a known username that happens
> to be all powerful from being bute-forced.

The only problem I've found with this is that X applications fail after
using su. But it's OK if you only need to use text-based admin tools.

-- 
http://jonathan.rawle.org/





More information about the fedora-list mailing list