illegal user root user failed login attempts

Kirk Strauser kirk at strauser.com
Wed May 18 13:57:13 PDT 2005


On Tuesday 17 May 2005 09:36, Peter Kropholler wrote:

> As things stand, ssh is designed so you can't get at people's passwords
> and I am leaving it alone. Focussing instead on the task of making
> sure my passwords are strong, limiting AllowUsers to specific users and
> trusted ip addresses, and moving ssh off port 22.

Alternatively, scrap all that and force RSA authentication after disabling 
password login.  I could give you my root password (and even my personal 
password) and there isn't jack you can do with it because no services 
authenticate off it; it's only useful for logging in locally.
-- 
Kirk Strauser
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 155 bytes
Desc: not available
Url : http://lists.freebsd.org/pipermail/freebsd-questions/attachments/20050518/2ab36662/attachment.bin


More information about the freebsd-questions mailing list