On Wed, Apr 09, 2025 at 09:34:08 -0400, Jeffrey Walton wrote:
> Disabling root logins by default is especially important when a
> network attacker can use the login, like via SSH. The network attacker
> is usually your #1 threat,

There may be systems where this is true; for example, a public web
server.

On the vast majority of desktop systems, however, the #1 threat is
probably one of these:

 * Malicious code executed within a web browser by an ad, or a web page,
   or something the user clicks in a spam email.

 * Social engineering attacks in which the user is tricked into giving
   information to a malicious party (phishing email, etc.).

<https://xkcd.com/1200/> is pertinent here.  An infiltration of the
root account is bad, but mostly because of what it lets the attacker
do *afterward*.  They may install a key logger, or packet sniffer, or
something along those lines, which gives them the user's personal
data or secret credentials, which they can then use for their actual
attack, which might be identity theft, regular old theft, etc.

Reply via email to