On Thu, Jun 3, 2010 at 10:04 AM,  <aidal...@no8wireless.co.nz> wrote:
> Peter Glassenbury (CSSE) wrote:
>> Sorry not even at a university lab... If someone wants to brute force
>> our root account, they obviously have not enough work to do.
>> Our logging should find the attempts...
>> Like Volker, I have yet to be convinced of the point of typing
>> "sudo " in front of all the commands I want to run as root.
>> When it becomes reflex, you are going to make the same mistakes
>> as if you login as root.
>
>
> True, because the attack would have to be carried out manually, so you
> could just pull out the crow bar and stand outside the lab when it
> happens, not to mention that it would take forever to reach, say, 100
> attempts, which would hardly make a dent (so to speak).
>
> There are pros and cons of either choice.  For me, it's pointless to
> have a root password, because I can never remember what it is, and I
> usually only want to execute one command as root at a time, anyway.
> But that's just my preference.  I can imagine that Pete boots the lab
> machines into single-user mode, for which he needs the root password,
> to diagnose problems.  Even if that was disabled, there could still
> only be one password for admins: the BIOS password (for booting from a
> CD, for example).
>

physical access means root access!

Reply via email to