ssh default security risc

Gert Cuykens gert.cuykens at gmail.com
Thu Feb 3 15:36:14 PST 2005


On Thu, 03 Feb 2005 23:34:42 +0000, Chris Hodgins
<chodgins at cis.strath.ac.uk> wrote:
> Gert Cuykens wrote:
> > By default the root ssh is disabled. If a dedicated server x somewhere
> > far far away doesn't have root ssh enabled the admin is pretty much
> > screwed if they hack his user  account and change the user password
> > right ?
> >
> > So is it not better to enable it by default ?
> > _______________________________________________
> > freebsd-questions at freebsd.org mailing list
> > http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> > To unsubscribe, send any mail to "freebsd-questions-unsubscribe at freebsd.org"
> >
> 
> Every unix box has a root account.  Not every unix box has a jblogs
> account.  Lets take the example of a brute-force attempt.  The first
> thing I would do would be to attack roots password.  I know the account
> exists.  Might as well go for the big prize first.
> 
> So having a root account enabled is definetly a bad thing.
> 
> Chris
> 

Do you agree a user acount is most of the time more vonerable then the
root account ?

If they can hack the root they can defenatly hack a user account too.
So i dont see any meaning of disabeling it.


More information about the freebsd-questions mailing list