Sandal6823@sh.itjust.works to Linux@lemmy.ml · edit-24 maanden geledenWhy disable ssh login with root on a server if I only log in with keys, not password?message-squaremessage-square78linkfedilinkarrow-up1107arrow-down14file-text
arrow-up1103arrow-down1message-squareWhy disable ssh login with root on a server if I only log in with keys, not password?Sandal6823@sh.itjust.works to Linux@lemmy.ml · edit-24 maanden geledenmessage-square78linkfedilinkfile-text
On a server I have a public key auth only for root account. Is there any point of logging in with a different account?
minus-squareShortN0te@lemmy.mllinkfedilinkarrow-up3arrow-down6·4 maanden geledenAnd how would you not be able to hijack the password when you have control over the user session?
minus-squareslothrop@lemmy.calinkfedilinkEnglisharrow-up7arrow-down3·4 maanden geledenYou would have to know the root password.
minus-squareShortN0te@lemmy.mllinkfedilinkarrow-up4arrow-down6·4 maanden geledenWith aliases in the bashrc you can hijack any command and execute instead of the command any arbitrary commands. So the command can be extracted, as already stated above, this is not a weakness of sudo but a general one.
minus-squareslothrop@lemmy.calinkfedilinkEnglisharrow-up6arrow-down3·4 maanden geledenYou would have to KNOW the root password.
minus-squareShortN0te@lemmy.mllinkfedilinkarrow-up5arrow-down5·4 maanden geledenNo you can alias that command and hijack the password promt via bashrc and then you have the root password as soon as the user enters it.
minus-squaremiss_demeanour@lemmy.dbzer0.comlinkfedilinkEnglisharrow-up5arrow-down1·edit-24 maanden geledenAs root: # chattr +i /home/ShortN0te/.bashrc Anything else?
minus-squareShortN0te@lemmy.mllinkfedilinkarrow-up4arrow-down4·4 maanden geledenThere are many ways to harden against it, but “just disable root auth” is not really it, since it in itself does not add much.
minus-squaremiss_demeanour@lemmy.dbzer0.comlinkfedilinkEnglisharrow-up5arrow-down2·4 maanden geleden?? Seriously - if you’re “advising” on linux best practices, get lots of liability insurance.
minus-square2ndSkin@sh.itjust.workslinkfedilinkarrow-up5arrow-down2·4 maanden geledenSo, you learned about .bashrc today, and you’re now an expert? Perhaps stand down and let the experts have their say.
minus-square2ndSkin@sh.itjust.workslinkfedilinkarrow-up5arrow-down3·4 maanden geledenNo, that’s not how it works. You really should stop talking shit about things you know nothing about. Truly sad.
And how would you not be able to hijack the password when you have control over the user session?
You would have to know the root password.
With aliases in the bashrc you can hijack any command and execute instead of the command any arbitrary commands. So the command can be extracted, as already stated above, this is not a weakness of sudo but a general one.
You would have to KNOW the root password.
No you can alias that command and hijack the password promt via bashrc and then you have the root password as soon as the user enters it.
As root:
Anything else?
There are many ways to harden against it, but “just disable root auth” is not really it, since it in itself does not add much.
??
Seriously - if you’re “advising” on linux best practices, get lots of liability insurance.
So, you learned about .bashrc today, and you’re now an expert?
Perhaps stand down and let the experts have their say.
No, that’s not how it works.
You really should stop talking shit about things you know nothing about.
Truly sad.