Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 2 May 2003 16:45:54 +0700
From:      =?Windows-1251?B?9fPl8PPq?= <anyher@ngs.ru>
To:        "Fedder Skovgaard" <fsk@maerskdata.dk>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: Being root via ssl
Message-ID:  <176721945.20030502164554@ngs.ru>
In-Reply-To: <OFAEF92425.1AC61264-ONC1256D1A.00311AA3-C1256D1A.0032A2DF@mdata.dk>
References:  <OFAEF92425.1AC61264-ONC1256D1A.00311AA3-C1256D1A.0032A2DF@mdata.dk>

next in thread | previous in thread | raw e-mail | index | archive | help

FS> What is the preferred way of doing this, and is it _really_ dangerous to 
FS> allow root login via ssl ?

   teoreticaly  its  much  more insecure , because ssh *realy* can be
   craced from the same segment of  network , but  if  you works  like
   a ordinar user  , and than do su root (or just su ) root password
   is transmiting  not in first bytes of  data - if  you works some
   time like ordinar user.

   only users  in group 0  can su to root  (by default) im think it's
   preferred to login  and  after is  su to root.
    Also its prefired because you can't do somthing  that will brake your system while
   you an ordinar user ,it not 'fantom menace' :) , specialy when your
   machine  is serving  some clients . You realy  dont need in a
   fullcontrol to read man pages , or using  ports collection (till moment  of
   'make  install' )


-- 
Best regards,
                           mailto:anyher@ngs.ru



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?176721945.20030502164554>