On Thursday 18 July 2002 15:08, Brad Felmey wrote: > Since you have to be root in the first place to modify sshd_config, to > useradd, to vi shadow, then you're already root, and why would it be > necessary to deliberately then make a remote hole? The only use I could > see is a scripted trojan or worm.
maybe he wants to have some account with empty password, but not let someone use them remotely via ssh.