Sandal6823@sh.itjust.works to Linux@lemmy.ml · edit-27 months agoWhy disable ssh login with root on a server if I only log in with keys, not password?message-squaremessage-square71fedilinkarrow-up184arrow-down14file-text
arrow-up180arrow-down1message-squareWhy disable ssh login with root on a server if I only log in with keys, not password?Sandal6823@sh.itjust.works to Linux@lemmy.ml · edit-27 months agomessage-square71fedilinkfile-text
On a server I have a public key auth only for root account. Is there any point of logging in with a different account?
minus-squareBrianTheeBiscuiteer@lemmy.worldlinkfedilinkarrow-up4·7 months agoDoesn’t even have to be the key necessarily. Could get in via some exploit first. Either way taking over the machine became a 2-step process.
minus-square☂️-@lemmy.mllinkfedilinkarrow-up1·edit-27 months agoyou would need 2 different exploits for 2 different types of attack though. its always good to have an extra layer of “oh shit i need another exploit”. unless your threat modelling includes nation-states, that is.
Doesn’t even have to be the key necessarily. Could get in via some exploit first. Either way taking over the machine became a 2-step process.
you would need 2 different exploits for 2 different types of attack though.
its always good to have an extra layer of “oh shit i need another exploit”. unless your threat modelling includes nation-states, that is.