<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Login as root in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197372#M10066</link>
    <description>Just wanted to add 2 cents to the security thread here. I don't see how logging in with telnet as userx and running "su - root" is more secure than logging in directly as root. Someone snooping your network is going to get your passwords regardless.</description>
    <pubDate>Fri, 20 Feb 2004 13:39:27 GMT</pubDate>
    <dc:creator>Paul Cross_1</dc:creator>
    <dc:date>2004-02-20T13:39:27Z</dc:date>
    <item>
      <title>Login as root</title>
      <link>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197365#M10059</link>
      <description>In our system , the root can't login directly , it can only login as gerenal user then "su" to root , how to make the root user can login directly ? thx.</description>
      <pubDate>Fri, 20 Feb 2004 01:06:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197365#M10059</guid>
      <dc:creator>peterchu</dc:creator>
      <dc:date>2004-02-20T01:06:02Z</dc:date>
    </item>
    <item>
      <title>Re: Login as root</title>
      <link>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197366#M10060</link>
      <description>Remove /etc/securetty or add all the terminals that you want root to be able to log in from.&lt;BR /&gt; &lt;BR /&gt;This file contains a list of terminals root can log on to.</description>
      <pubDate>Fri, 20 Feb 2004 02:44:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197366#M10060</guid>
      <dc:creator>Mark Grant</dc:creator>
      <dc:date>2004-02-20T02:44:45Z</dc:date>
    </item>
    <item>
      <title>Re: Login as root</title>
      <link>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197367#M10061</link>
      <description>thx reply , for the second method , I want my pc can login as root through the telnet function , what terminaal that I should add to ? thx.</description>
      <pubDate>Fri, 20 Feb 2004 02:54:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197367#M10061</guid>
      <dc:creator>peterchu</dc:creator>
      <dc:date>2004-02-20T02:54:24Z</dc:date>
    </item>
    <item>
      <title>Re: Login as root</title>
      <link>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197368#M10062</link>
      <description>This might get a bit irritating for you and isn't particularly secure but you have to add all the "pseudo" tty's that you are likely to use.  If you only have a few users then it's not so bad though.&lt;BR /&gt;&lt;BR /&gt;You could start off by adding these&lt;BR /&gt; &lt;BR /&gt;pts/0&lt;BR /&gt;pts/1&lt;BR /&gt;pts/2&lt;BR /&gt;pts/3&lt;BR /&gt;pts/4&lt;BR /&gt;pts/5&lt;BR /&gt;pts/6&lt;BR /&gt;pts/7&lt;BR /&gt; &lt;BR /&gt;If you find you run out and you can't log in,  just add more of them.&lt;BR /&gt; &lt;BR /&gt;To find out what tty you are currently using run "tty".  However, you may well get a different pseudo tty each time you connect.  You just have to add all of the ones you are likely to use.&lt;BR /&gt;</description>
      <pubDate>Fri, 20 Feb 2004 03:01:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197368#M10062</guid>
      <dc:creator>Mark Grant</dc:creator>
      <dc:date>2004-02-20T03:01:34Z</dc:date>
    </item>
    <item>
      <title>Re: Login as root</title>
      <link>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197369#M10063</link>
      <description>Don't do this. This is not at all advised. &lt;BR /&gt;&lt;BR /&gt;edit /etc/securetty and add&lt;BR /&gt;pts/0&lt;BR /&gt;pts/1&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 20 Feb 2004 04:43:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197369#M10063</guid>
      <dc:creator>PVR</dc:creator>
      <dc:date>2004-02-20T04:43:53Z</dc:date>
    </item>
    <item>
      <title>Re: Login as root</title>
      <link>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197370#M10064</link>
      <description>This si an extra layer of security. Please bear with this it will help you if somebody will play with your system.&lt;BR /&gt;&lt;BR /&gt;even if you want to login as root from PC put the entries in /etc/securtty file.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sunil</description>
      <pubDate>Fri, 20 Feb 2004 04:48:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197370#M10064</guid>
      <dc:creator>Sunil Sharma_1</dc:creator>
      <dc:date>2004-02-20T04:48:11Z</dc:date>
    </item>
    <item>
      <title>Re: Login as root</title>
      <link>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197371#M10065</link>
      <description>I'd go with Mark Grant's advise rather than PVR's since if (for example) you use X and open a terminals there - then each terminal would occupy respective /dev/ptsX and you may simply run out of the permitted terminals .To see who's logged and where use the w command.&lt;BR /&gt;As for security -since you do enable telnet not to mention for root-I understand that the security is not the issue here.</description>
      <pubDate>Fri, 20 Feb 2004 08:03:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197371#M10065</guid>
      <dc:creator>Alexander Chuzhoy</dc:creator>
      <dc:date>2004-02-20T08:03:24Z</dc:date>
    </item>
    <item>
      <title>Re: Login as root</title>
      <link>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197372#M10066</link>
      <description>Just wanted to add 2 cents to the security thread here. I don't see how logging in with telnet as userx and running "su - root" is more secure than logging in directly as root. Someone snooping your network is going to get your passwords regardless.</description>
      <pubDate>Fri, 20 Feb 2004 13:39:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197372#M10066</guid>
      <dc:creator>Paul Cross_1</dc:creator>
      <dc:date>2004-02-20T13:39:27Z</dc:date>
    </item>
    <item>
      <title>Re: Login as root</title>
      <link>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197373#M10067</link>
      <description>If you use SSH&lt;BR /&gt;&lt;BR /&gt;/etc/ssh/sshd_config&lt;BR /&gt;           PermitRootLogin yes</description>
      <pubDate>Fri, 20 Feb 2004 14:36:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197373#M10067</guid>
      <dc:creator>Olivier Drouin</dc:creator>
      <dc:date>2004-02-20T14:36:58Z</dc:date>
    </item>
    <item>
      <title>Re: Login as root</title>
      <link>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197374#M10068</link>
      <description>You really should have a look at ssh for root logins. It gives you all that telnet does, but since the password is sent encrypted it is much more secure.&lt;BR /&gt;&lt;BR /&gt;Basic usage: ssh root@&lt;MY host="" here=""&gt;&lt;BR /&gt;&lt;BR /&gt;Greetings, Martin&lt;/MY&gt;</description>
      <pubDate>Fri, 20 Feb 2004 21:22:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197374#M10068</guid>
      <dc:creator>Martin P.J. Zinser</dc:creator>
      <dc:date>2004-02-20T21:22:21Z</dc:date>
    </item>
    <item>
      <title>Re: Login as root</title>
      <link>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197375#M10069</link>
      <description>pcross --&lt;BR /&gt;&lt;BR /&gt;Requiring an "su" keeps somebody from brute-forcing the root password remotely.  You're right that if they eavesdrop the connection that they get it either way.  But with root-enabled telnet it's possible for an attacker to keep trying root passwords forever across the network and eventually they'll get in.&lt;BR /&gt;&lt;BR /&gt;So disabling root access from telnet (or ssh for that matter) adds at least one more step somebody has to go through to own the system.&lt;BR /&gt;</description>
      <pubDate>Fri, 20 Feb 2004 22:09:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197375#M10069</guid>
      <dc:creator>Mark Travis</dc:creator>
      <dc:date>2004-02-20T22:09:30Z</dc:date>
    </item>
    <item>
      <title>Re: Login as root</title>
      <link>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197376#M10070</link>
      <description>hi there,&lt;BR /&gt;&lt;BR /&gt;i suggest you use ssh... &lt;BR /&gt;ssh [ip add] you can remote log in as root directly and offers security as well.&lt;BR /&gt;&lt;BR /&gt;rgds,&lt;BR /&gt;Bong</description>
      <pubDate>Sat, 21 Feb 2004 08:57:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197376#M10070</guid>
      <dc:creator>bong_3</dc:creator>
      <dc:date>2004-02-21T08:57:55Z</dc:date>
    </item>
    <item>
      <title>Re: Login as root</title>
      <link>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197377#M10071</link>
      <description>Mark Travis:&lt;BR /&gt;But is ssh really any different? I could sit and type root passwds for root-enabled ssh until my fingers are nubs.</description>
      <pubDate>Mon, 23 Feb 2004 13:14:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197377#M10071</guid>
      <dc:creator>Paul Cross_1</dc:creator>
      <dc:date>2004-02-23T13:14:33Z</dc:date>
    </item>
    <item>
      <title>Re: Login as root</title>
      <link>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197378#M10072</link>
      <description>Many responders have missed the point of having an /etc/securetty file.  Logging in as root using telnet, remsh or rsh does not leave an audit trail.  However, if you log into a private user, and use the su command, this is logged in the syslog file.  This is part and parcel of any reasonably secure system.  In a shop where multiple people have the root account, merely looking at this log tells you who actually was on the system when it was screwed up.  &lt;BR /&gt;As a rule, secure shell is a superior way to go, as it also writes logs, but if its configured properly will not challenge for a password, yet still be secure.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Chris</description>
      <pubDate>Mon, 23 Feb 2004 17:39:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197378#M10072</guid>
      <dc:creator>Chris Vail</dc:creator>
      <dc:date>2004-02-23T17:39:05Z</dc:date>
    </item>
    <item>
      <title>Re: Login as root</title>
      <link>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197379#M10073</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;also to note, there is a root on every unix system I ever worked on, so this is a known good account to attack. Throwing in a "normal" user account in between means one more thing to guess for an outside attacker (does not help against internals though).&lt;BR /&gt;&lt;BR /&gt;Greetings, Martin</description>
      <pubDate>Mon, 23 Feb 2004 21:40:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/login-as-root/m-p/3197379#M10073</guid>
      <dc:creator>Martin P.J. Zinser</dc:creator>
      <dc:date>2004-02-23T21:40:38Z</dc:date>
    </item>
  </channel>
</rss>

