• ShortN0te@lemmy.ml
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    8 months ago

    disable root login

    That does not do much in practice. When a user is compromised a simple alias put in the .bashrc can compromise the sudo password.

    Explicitly limit the user accounts that can login so that accidentally no test or service account with temporary credentials can login via ssh is the better recommendation.

    • drkt@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      8
      ·
      8 months ago

      I think the point is that root is a universal user found on all linux systems where as users have all kinds of names. It narrows down the variables to brute-force, so simply removing the ability to use it means they have to guess a username and a password.

      • ShortN0te@lemmy.ml
        link
        fedilink
        English
        arrow-up
        6
        arrow-down
        3
        ·
        8 months ago

        guess a username and a password.

        Security by obscurity is no security. Use something like fail2ban to prevent brute force. When you use a secure password and or key this also does not matter much.