<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: direct root access restrict..... in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/direct-root-access-restrict/m-p/3660462#M20328</link>
    <description>The fastest solution is to change root's password,thus preventing from users to login as root.&lt;BR /&gt;If you want to have centralized management of users then you should consider to setup domain (NIS or LDAP ).</description>
    <pubDate>Sun, 30 Oct 2005 03:57:09 GMT</pubDate>
    <dc:creator>Alexander Chuzhoy</dc:creator>
    <dc:date>2005-10-30T03:57:09Z</dc:date>
    <item>
      <title>direct root access restrict.....</title>
      <link>https://community.hpe.com/t5/operating-system-linux/direct-root-access-restrict/m-p/3660458#M20324</link>
      <description>Hai all,&lt;BR /&gt;&lt;BR /&gt;In my company every one are login directly as root. i would like to restrict that direct login to root. I would like all users to login using an individual user account and then use SU as necessary.&lt;BR /&gt;&lt;BR /&gt;plz prepose some solutions to this problem.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;thanks and regards &lt;BR /&gt;sukumar</description>
      <pubDate>Sat, 29 Oct 2005 04:44:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/direct-root-access-restrict/m-p/3660458#M20324</guid>
      <dc:creator>sukumar maddela</dc:creator>
      <dc:date>2005-10-29T04:44:49Z</dc:date>
    </item>
    <item>
      <title>Re: direct root access restrict.....</title>
      <link>https://community.hpe.com/t5/operating-system-linux/direct-root-access-restrict/m-p/3660459#M20325</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;If you are talking about a single or a few number of servers accessed by many people :&lt;BR /&gt;&lt;BR /&gt;1 - Make sure that you have a file named /etc/securetty, with the following content :&lt;BR /&gt;&lt;BR /&gt;tty1&lt;BR /&gt;tty2&lt;BR /&gt;tty3&lt;BR /&gt;tty4&lt;BR /&gt;tty5&lt;BR /&gt;tty6&lt;BR /&gt;vc/1&lt;BR /&gt;vc/2&lt;BR /&gt;vc/3&lt;BR /&gt;vc/4&lt;BR /&gt;vc/5&lt;BR /&gt;vc/6&lt;BR /&gt;&lt;BR /&gt;It means that root can logon only on local console (not remotely).&lt;BR /&gt;&lt;BR /&gt;2 - In SSH configuration file /etc/ssh/sshd_config :&lt;BR /&gt;&lt;BR /&gt;PermitRootLogin no&lt;BR /&gt;&lt;BR /&gt;Then restart sshd to apply changes.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;If you are talking about Linux desktops or workstations, there is no solution : if the user have some Linux knowledge, (s)he can by-pass any protection you may setup. Therefore, the only method in this case is education, security awareness, ...&lt;BR /&gt;&lt;BR /&gt;Good lcuk,&lt;BR /&gt;Kodjo&lt;BR /&gt;</description>
      <pubDate>Sat, 29 Oct 2005 13:02:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/direct-root-access-restrict/m-p/3660459#M20325</guid>
      <dc:creator>Kodjo Agbenu</dc:creator>
      <dc:date>2005-10-29T13:02:05Z</dc:date>
    </item>
    <item>
      <title>Re: direct root access restrict.....</title>
      <link>https://community.hpe.com/t5/operating-system-linux/direct-root-access-restrict/m-p/3660460#M20326</link>
      <description>Create users for the other people and change the root password.&lt;BR /&gt;&lt;BR /&gt;Make sure you have backing from management but I think they'll agree root access for all is like playing with matches in an ammunition dump.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Sat, 29 Oct 2005 15:06:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/direct-root-access-restrict/m-p/3660460#M20326</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2005-10-29T15:06:05Z</dc:date>
    </item>
    <item>
      <title>Re: direct root access restrict.....</title>
      <link>https://community.hpe.com/t5/operating-system-linux/direct-root-access-restrict/m-p/3660461#M20327</link>
      <description>Get a utility called "sudo" - then any user who needs to issue a specific root-level cmd can be set up in a permissions table and can only do what you permit him to do. sudo activity is logged.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;Sorrel</description>
      <pubDate>Sat, 29 Oct 2005 22:38:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/direct-root-access-restrict/m-p/3660461#M20327</guid>
      <dc:creator>Sorrel G. Jakins</dc:creator>
      <dc:date>2005-10-29T22:38:00Z</dc:date>
    </item>
    <item>
      <title>Re: direct root access restrict.....</title>
      <link>https://community.hpe.com/t5/operating-system-linux/direct-root-access-restrict/m-p/3660462#M20328</link>
      <description>The fastest solution is to change root's password,thus preventing from users to login as root.&lt;BR /&gt;If you want to have centralized management of users then you should consider to setup domain (NIS or LDAP ).</description>
      <pubDate>Sun, 30 Oct 2005 03:57:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/direct-root-access-restrict/m-p/3660462#M20328</guid>
      <dc:creator>Alexander Chuzhoy</dc:creator>
      <dc:date>2005-10-30T03:57:09Z</dc:date>
    </item>
    <item>
      <title>Re: direct root access restrict.....</title>
      <link>https://community.hpe.com/t5/operating-system-linux/direct-root-access-restrict/m-p/3660463#M20329</link>
      <description>Make use of TCP-Wrappers for all services by editing "/etc/hosts.allow" and "/etc/hosts.deny". This enables to tie-down users to specific IP-Addresses or subnets. That way if users try from another location they will be denied access.</description>
      <pubDate>Sun, 30 Oct 2005 09:49:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/direct-root-access-restrict/m-p/3660463#M20329</guid>
      <dc:creator>Andrew Cowan</dc:creator>
      <dc:date>2005-10-30T09:49:13Z</dc:date>
    </item>
    <item>
      <title>Re: direct root access restrict.....</title>
      <link>https://community.hpe.com/t5/operating-system-linux/direct-root-access-restrict/m-p/3660464#M20330</link>
      <description>Another couple of nice security tweaks:&lt;BR /&gt;&lt;BR /&gt;1. Use PAM to disable the system-wide usage of .rhosts files in user's home directories by adding these lines to /etc/pam.d/rlogin: &lt;BR /&gt;&lt;BR /&gt;#&lt;BR /&gt;# Disable rsh/rlogin/rexec for users&lt;BR /&gt;#&lt;BR /&gt;login auth required pam_rhosts_auth.so no_rhosts&lt;BR /&gt;&lt;BR /&gt;2. Limit who has access to the command. &lt;BR /&gt;One of the simplest ways to do this is to add users to the special administrative group called wheel. To do this, type the following command as root: &lt;BR /&gt;&lt;BR /&gt;usermod -G wheel &lt;USERNAME&gt;&lt;BR /&gt;&lt;BR /&gt;In the previous command, replace &lt;USERNAME&gt; with the username being added to the wheel group&lt;BR /&gt;Next, open the PAM configuration file for su â  /etc/pam.d/suâ   in a text editor and remove the comment [#] from the following line: &lt;BR /&gt;&lt;BR /&gt;auth  required /lib/security/pam_wheel.so use_uid&lt;BR /&gt;&lt;BR /&gt;Doing this permits only members of the administrative group wheel to use the program. &lt;BR /&gt;&lt;BR /&gt;&lt;/USERNAME&gt;&lt;/USERNAME&gt;</description>
      <pubDate>Sun, 30 Oct 2005 09:54:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/direct-root-access-restrict/m-p/3660464#M20330</guid>
      <dc:creator>Andrew Cowan</dc:creator>
      <dc:date>2005-10-30T09:54:01Z</dc:date>
    </item>
    <item>
      <title>Re: direct root access restrict.....</title>
      <link>https://community.hpe.com/t5/operating-system-linux/direct-root-access-restrict/m-p/3660465#M20331</link>
      <description>I am a fan of the 'wheel' group solution. &lt;BR /&gt;&lt;BR /&gt;If all of the users know the root passwd, they cannot login as root, they cannot su - to the root either.&lt;BR /&gt;&lt;BR /&gt;Use the /etc/securetty file to allow direct root login only on console.&lt;BR /&gt;&lt;BR /&gt;If using ssh, modify the sshd_config to PermitRootLogin No&lt;BR /&gt;&lt;BR /&gt;For telnet, the /etc/securetty file will suffice.&lt;BR /&gt;&lt;BR /&gt;For ftp, use the ftpusers/ftpaccess files.&lt;BR /&gt;</description>
      <pubDate>Mon, 31 Oct 2005 12:39:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/direct-root-access-restrict/m-p/3660465#M20331</guid>
      <dc:creator>Rick Garland</dc:creator>
      <dc:date>2005-10-31T12:39:30Z</dc:date>
    </item>
  </channel>
</rss>

