• ShortN0teEnglish
    arrow-up
    4
    arrow-down
    1
    ·
    6 months ago
    link
    fedilink

    disable root login

    That does not do much in practice. When a user is compromised a simple alias put in the .bashrc can compromise the sudo password.

    Explicitly limit the user accounts that can login so that accidentally no test or service account with temporary credentials can login via ssh is the better recommendation.

    • drktEnglish
      arrow-up
      8
      arrow-down
      0
      ·
      6 months ago
      link
      fedilink

      I think the point is that root is a universal user found on all linux systems where as users have all kinds of names. It narrows down the variables to brute-force, so simply removing the ability to use it means they have to guess a username and a password.

      • ShortN0teEnglish
        arrow-up
        6
        arrow-down
        3
        ·
        6 months ago
        link
        fedilink

        guess a username and a password.

        Security by obscurity is no security. Use something like fail2ban to prevent brute force. When you use a secure password and or key this also does not matter much.

        • wreckedcarzzEnglish
          arrow-up
          2
          arrow-down
          0
          ·
          6 months ago
          link
          fedilink

          Something something don’t let ‘good’ be the enemy of ‘perfect’