how to react on ssh attacks?

Scot L. Harris webid at cfl.rr.com
Thu Oct 27 00:24:58 UTC 2005


On Wed, 2005-10-26 at 19:54, Jonathan Rawle wrote:
> Michael A. Peters wrote:
> 
> > 
> > It's a known user ID on a system, and an incredibly powerful one.
> > No one will have root access that doesn't have a regular user account as
> > well, therefore, forcing remote root users to first log in as their
> > regular user and then su to root prevents a known username that happens
> > to be all powerful from being bute-forced.
> 
> The only problem I've found with this is that X applications fail after
> using su. But it's OK if you only need to use text-based admin tools.

Are you using the command:  su - or just su?

X apps should work just fine.  They do here.





More information about the fedora-list mailing list