On Wed, Apr 09, 2025 at 09:34:08AM -0400, Jeffrey Walton wrote:

[...]

> Disabling root logins by default is especially important when a
> network attacker can use the login, like via SSH.

To achieve this...

>                                                   The network attacker
> is usually your #1 threat, and you don't want to give the network
> attacker an opportunity to obtain root merely by guessing a weak
> password over the internet. (There are other things you should also do
> for SSH, like disabling passwords and enabling public key
> authentication).

...disabling root logins over SSH should suffice. I think those
are orthogonal.

Don't get me wrong: I, at some point, dropped root password,
but more for convenience than for anything else.

Cheers
-- 
t

Attachment: signature.asc
Description: PGP signature

Reply via email to