ssh default security risc

Giorgos Keramidas keramida at ceid.upatras.gr
Thu Feb 3 22:01:14 PST 2005


On 2005-02-04 01:04, Gert Cuykens <gert.cuykens at gmail.com> wrote:
> On Fri, 04 Feb 2005 00:05:34 +0000, Chris Hodgins
> <chodgins at cis.strath.ac.uk> wrote:
> True but the point is without the ssh root enabled there is nothing
> you can do about it to stop them if they change your user password

What user password?  You are using SSH keys, as many have noted in
earlier posts of the thread, right? :P

Seriously now.  What gave you the crazy idea that having local access as
an unprivileged user means that automatically you are also root?  Effort
is *still* needed.  Effort that the average Joe Random Cracker is _NOT_
going to spend.

You may also want to consider than having SSH enabled for root means
there is only ONE step at becoming root from any remote location.

Having to SSH as a user first, with the right combination of SSH keys
and passwords, and then use su(1) with yet another password is at least
one more step.

Why is the first, 1-step procedure safer than the second?

- Giorgos



More information about the freebsd-questions mailing list