ssh default security risc
Gert Cuykens
gert.cuykens at gmail.com
Thu Feb 3 15:36:14 PST 2005
On Thu, 03 Feb 2005 23:34:42 +0000, Chris Hodgins
<chodgins at cis.strath.ac.uk> wrote:
> Gert Cuykens wrote:
> > By default the root ssh is disabled. If a dedicated server x somewhere
> > far far away doesn't have root ssh enabled the admin is pretty much
> > screwed if they hack his user account and change the user password
> > right ?
> >
> > So is it not better to enable it by default ?
> > _______________________________________________
> > freebsd-questions at freebsd.org mailing list
> > http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> > To unsubscribe, send any mail to "freebsd-questions-unsubscribe at freebsd.org"
> >
>
> Every unix box has a root account. Not every unix box has a jblogs
> account. Lets take the example of a brute-force attempt. The first
> thing I would do would be to attack roots password. I know the account
> exists. Might as well go for the big prize first.
>
> So having a root account enabled is definetly a bad thing.
>
> Chris
>
Do you agree a user acount is most of the time more vonerable then the
root account ?
If they can hack the root they can defenatly hack a user account too.
So i dont see any meaning of disabeling it.
More information about the freebsd-questions
mailing list