From: Roy Smith on
In article
<0dca0c03-ca0d-4e32-ad86-33c3f223193c(a)x2g2000prk.googlegroups.com>,
David Schwartz <davids(a)webmaster.com> wrote:

> If you are sure you want to allow direct SSH as root, edit your
> 'sshd_config' file. Add or uncomment a line that says "PermitRootLogin
> yes".

The "if you are sure" wording implies this is poor practice. Let me
just make that more explicit. It is poor practice to allow root logins.
Login as yourself and do su (or, even better, run what you need to run
with sudo).
From: Aragorn on
On Friday 16 July 2010 15:25 in comp.os.linux.networking, somebody
identifying as Roy Smith wrote...

> In article
> <0dca0c03-ca0d-4e32-ad86-33c3f223193c(a)x2g2000prk.googlegroups.com>,
> David Schwartz <davids(a)webmaster.com> wrote:
>
>> If you are sure you want to allow direct SSH as root, edit your
>> 'sshd_config' file. Add or uncomment a line that says
>> "PermitRootLogin yes".
>
> The "if you are sure" wording implies this is poor practice. Let me
> just make that more explicit. It is poor practice to allow root
> logins.

I second that.

> Login as yourself and do su (or, even better, run what you
> need to run with sudo).

But here I will disagree, in the sense that "sudo" is generally set up
to require only the user's own password, albeit that this can be
changed.

"su" is therefore a safer approach in most set-ups because it still
requires knowledge of the root password. That's three things an
attacker has to guess: the account's login, the account's password and
the root password.

--
*Aragorn*
(registered GNU/Linux user #223157)
From: Keith Keller on
On 2010-07-16, Aragorn <aragorn(a)chatfactory.invalid> wrote:
> But here I will disagree, in the sense that "sudo" is generally set up
> to require only the user's own password, albeit that this can be
> changed.
>
> "su" is therefore a safer approach in most set-ups because it still
> requires knowledge of the root password. That's three things an
> attacker has to guess: the account's login, the account's password and
> the root password.

As always, what is a "safer" approach depends wildly on the particular
situation. Both su and sudo will log logins, but only sudo will log
actual commands executed (unless you do sudo su or similar which gets
you a root shell).

--keith

--
kkeller-usenet(a)wombat.san-francisco.ca.us
(try just my userid to email me)
AOLSFAQ=http://www.therockgarden.ca/aolsfaq.txt
see X- headers for PGP signature information

From: jny0 on
The device in question is an embedded pc running linux from
buildroot. It only has a root user, with no password. It will not
allow me to add users, but will allow me to apply a password to the
root user. With this set, putty was allowed to ssh in. I'll have to
rebuild buildroot with either a root password by default, or some
users for remote access.

Thanks for everyone's help.
From: Grant on
On Fri, 16 Jul 2010 08:43:09 -0700 (PDT), jny0 <jny0(a)hotmail.com> wrote:

>The device in question is an embedded pc running linux from
>buildroot. It only has a root user, with no password. It will not
>allow me to add users, but will allow me to apply a password to the
>root user. With this set, putty was allowed to ssh in. I'll have to
>rebuild buildroot with either a root password by default, or some
>users for remote access.

Is the device accessible from the Internet?

I have no problem allowing passwordless root login on localnet for
PuTTY. And, the Internet facing box doesn't even allow username /
password login. Only the private/public keys method.

PuTTY includes an agent that you enter your passphrase into once on
startup. So, it's secure and transparent, open new PuTTY session
and type in root or username on the new terminal.

Grant.