<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Mandrake - root account network login in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/mandrake-root-account-network-login/m-p/2447735#M222</link>
    <description>I strongly reccomend not doing this.&lt;BR /&gt;There is a reason you su to root. I know it is an annoyance but get used to it.</description>
    <pubDate>Wed, 25 Oct 2000 03:50:51 GMT</pubDate>
    <dc:creator>Jason Wohlgemuth_1</dc:creator>
    <dc:date>2000-10-25T03:50:51Z</dc:date>
    <item>
      <title>Mandrake - root account network login</title>
      <link>https://community.hpe.com/t5/operating-system-linux/mandrake-root-account-network-login/m-p/2447733#M220</link>
      <description>I need to be able to telent to my linux box and login as root (I do not want to su to root).  Everytime I try its says invalid password.  I know this has something to do with security.  How do I change this so I can login to root on a standard telnet session to my redhat linux 6.1 box?</description>
      <pubDate>Mon, 25 Sep 2000 18:09:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/mandrake-root-account-network-login/m-p/2447733#M220</guid>
      <dc:creator>Richard Horton</dc:creator>
      <dc:date>2000-09-25T18:09:11Z</dc:date>
    </item>
    <item>
      <title>Re: Mandrake - root account network login</title>
      <link>https://community.hpe.com/t5/operating-system-linux/mandrake-root-account-network-login/m-p/2447734#M221</link>
      <description>Be sure you have a backup of it in case you want to undo the accion&lt;BR /&gt;Hi, It is very simple, just delete this file:&lt;BR /&gt;&lt;BR /&gt;/etc/securetty&lt;BR /&gt;&lt;BR /&gt;and thats all, you will be able to do remote root logins.</description>
      <pubDate>Mon, 25 Sep 2000 23:49:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/mandrake-root-account-network-login/m-p/2447734#M221</guid>
      <dc:creator>Marco Hernandez_1</dc:creator>
      <dc:date>2000-09-25T23:49:15Z</dc:date>
    </item>
    <item>
      <title>Re: Mandrake - root account network login</title>
      <link>https://community.hpe.com/t5/operating-system-linux/mandrake-root-account-network-login/m-p/2447735#M222</link>
      <description>I strongly reccomend not doing this.&lt;BR /&gt;There is a reason you su to root. I know it is an annoyance but get used to it.</description>
      <pubDate>Wed, 25 Oct 2000 03:50:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/mandrake-root-account-network-login/m-p/2447735#M222</guid>
      <dc:creator>Jason Wohlgemuth_1</dc:creator>
      <dc:date>2000-10-25T03:50:51Z</dc:date>
    </item>
    <item>
      <title>Re: Mandrake - root account network login</title>
      <link>https://community.hpe.com/t5/operating-system-linux/mandrake-root-account-network-login/m-p/2447736#M223</link>
      <description>Generally speaking, most distributions (if not all, by now) do NOT enable the "root" user logon via "telnet".  The primary reason being is that the password is sent "in the clear", so if anyone has a means to put a sniffer on your network, they'll have your password the next time you log in.&lt;BR /&gt;&lt;BR /&gt;(it's quite easy with most sniffers nowadays to set a "trigger condition" of "user logged on with root", then watch the next few packets to determine the password -- once set, this little demon waits patiently for "root" to come strolling by...)&lt;BR /&gt;&lt;BR /&gt;That said, even using "su -" via telnet SUFFERS FROM THE SAME FLAW!  "telnet" data is sent completely "in the clear", so now all the would-be interloper has to do is "sniff" for the case where "user typed 'su' at a command prompt" and capture the resulting password.  Technically no more difficult than the above, but functionally just a little bit more difficult [recognizing that "su" was at a command prompt and not "part of" some other input]&lt;BR /&gt;&lt;BR /&gt;If you REALLY MUST log on as root from a remote location, head on over to openssh and/or ssh.org -- there are free and low-cost versions of the "secure shell" [ssh] that allow "root" logins from remote consoles.  Essentially, the "secure" version uses SSL technology to encrypt the data stream, so even if a sniffer is employed, the data stream itself is garbage and (so far) exceptionally difficult to "crack".&lt;BR /&gt;&lt;BR /&gt;[sorry I don't have URLS handy -- but any decent search engine will give you more than you could possibly deal with...]&lt;BR /&gt;</description>
      <pubDate>Wed, 25 Oct 2000 06:39:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/mandrake-root-account-network-login/m-p/2447736#M223</guid>
      <dc:creator>Tom Emerson</dc:creator>
      <dc:date>2000-10-25T06:39:52Z</dc:date>
    </item>
    <item>
      <title>Re: Mandrake - root account network login</title>
      <link>https://community.hpe.com/t5/operating-system-linux/mandrake-root-account-network-login/m-p/2447737#M224</link>
      <description>Generally speaking, most distributions (if not all, by now) do NOT enable the "root" user logon via "telnet".  The primary reason being is that the password is sent "in the clear", so if anyone has a means to put a sniffer on your network, they'll have your password the next time you log in.&lt;BR /&gt;&lt;BR /&gt;(it's quite easy with most sniffers nowadays to set a "trigger condition" of "user logged on with root", then watch the next few packets to determine the password -- once set, this little demon waits patiently for "root" to come strolling by...)&lt;BR /&gt;&lt;BR /&gt;That said, even using "su -" via telnet SUFFERS FROM THE SAME FLAW!  "telnet" data is sent completely "in the clear", so now all the would-be interloper has to do is "sniff" for the case where "user typed 'su' at a command prompt" and capture the resulting password.  Technically no more difficult than the above, but functionally just a little bit more difficult [recognizing that "su" was at a command prompt and not "part of" some other input]&lt;BR /&gt;&lt;BR /&gt;If you REALLY MUST log on as root from a remote location, head on over to openssh and/or ssh.org -- there are free and low-cost versions of the "secure shell" [ssh] that allow "root" logins from remote consoles.  Essentially, the "secure" version uses SSL technology to encrypt the data stream, so even if a sniffer is employed, the data stream itself is garbage and (so far) exceptionally difficult to "crack".&lt;BR /&gt;&lt;BR /&gt;[sorry I don't have URLS handy -- but any decent search engine will give you more than you could possibly deal with...]&lt;BR /&gt;</description>
      <pubDate>Wed, 25 Oct 2000 06:40:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/mandrake-root-account-network-login/m-p/2447737#M224</guid>
      <dc:creator>Tom Emerson</dc:creator>
      <dc:date>2000-10-25T06:40:12Z</dc:date>
    </item>
    <item>
      <title>Re: Mandrake - root account network login</title>
      <link>https://community.hpe.com/t5/operating-system-linux/mandrake-root-account-network-login/m-p/2447738#M225</link>
      <description>Generally speaking, most distributions (if not all, by now) do NOT enable the "root" user logon via "telnet".  The primary reason being is that the password is sent "in the clear", so if anyone has a means to put a sniffer on your network, they'll have your password the next time you log in.&lt;BR /&gt;&lt;BR /&gt;(it's quite easy with most sniffers nowadays to set a "trigger condition" of "user logged on with root", then watch the next few packets to determine the password -- once set, this little demon waits patiently for "root" to come strolling by...)&lt;BR /&gt;&lt;BR /&gt;That said, even using "su -" via telnet SUFFERS FROM THE SAME FLAW!  "telnet" data is sent completely "in the clear", so now all the would-be interloper has to do is "sniff" for the case where "user typed 'su' at a command prompt" and capture the resulting password.  Technically no more difficult than the above, but functionally just a little bit more difficult [recognizing that "su" was at a command prompt and not "part of" some other input]&lt;BR /&gt;&lt;BR /&gt;If you REALLY MUST log on as root from a remote location, head on over to openssh and/or ssh.org -- there are free and low-cost versions of the "secure shell" [ssh] that allow "root" logins from remote consoles.  Essentially, the "secure" version uses SSL technology to encrypt the data stream, so even if a sniffer is employed, the data stream itself is garbage and (so far) exceptionally difficult to "crack".&lt;BR /&gt;&lt;BR /&gt;[sorry I don't have URLS handy -- but any decent search engine will give you more than you could possibly deal with...]&lt;BR /&gt;</description>
      <pubDate>Wed, 25 Oct 2000 06:40:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/mandrake-root-account-network-login/m-p/2447738#M225</guid>
      <dc:creator>Tom Emerson</dc:creator>
      <dc:date>2000-10-25T06:40:48Z</dc:date>
    </item>
    <item>
      <title>Re: Mandrake - root account network login</title>
      <link>https://community.hpe.com/t5/operating-system-linux/mandrake-root-account-network-login/m-p/2447739#M226</link>
      <description>Generally speaking, most distributions (if not all, by now) do NOT enable the "root" user logon via "telnet".  The primary reason being is that the password is sent "in the clear", so if anyone has a means to put a sniffer on your network, they'll have your password the next time you log in.&lt;BR /&gt;&lt;BR /&gt;(it's quite easy with most sniffers nowadays to set a "trigger condition" of "user logged on with root", then watch the next few packets to determine the password -- once set, this little demon waits patiently for "root" to come strolling by...)&lt;BR /&gt;&lt;BR /&gt;That said, even using "su -" via telnet SUFFERS FROM THE SAME FLAW!  "telnet" data is sent completely "in the clear", so now all the would-be interloper has to do is "sniff" for the case where "user typed 'su' at a command prompt" and capture the resulting password.  Technically no more difficult than the above, but functionally just a little bit more difficult [recognizing that "su" was at a command prompt and not "part of" some other input]&lt;BR /&gt;&lt;BR /&gt;If you REALLY MUST log on as root from a remote location, head on over to openssh and/or ssh.org -- there are free and low-cost versions of the "secure shell" [ssh] that allow "root" logins from remote consoles.  Essentially, the "secure" version uses SSL technology to encrypt the data stream, so even if a sniffer is employed, the data stream itself is garbage and (so far) exceptionally difficult to "crack".&lt;BR /&gt;&lt;BR /&gt;[sorry I don't have URLS handy -- but any decent search engine will give you more than you could possibly deal with...]&lt;BR /&gt;</description>
      <pubDate>Wed, 25 Oct 2000 06:40:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/mandrake-root-account-network-login/m-p/2447739#M226</guid>
      <dc:creator>Tom Emerson</dc:creator>
      <dc:date>2000-10-25T06:40:59Z</dc:date>
    </item>
    <item>
      <title>Re: Mandrake - root account network login</title>
      <link>https://community.hpe.com/t5/operating-system-linux/mandrake-root-account-network-login/m-p/2447740#M227</link>
      <description>AAACCCKKK!!! HP's web page is hosed!&lt;BR /&gt;&lt;BR /&gt;(I kept getting some sort of wierd "sendmail failed -- got response of 'we don't relay'" error message)  Sorry for the dupes -- I really thought they didn't actually "send"...&lt;BR /&gt;</description>
      <pubDate>Wed, 25 Oct 2000 06:42:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/mandrake-root-account-network-login/m-p/2447740#M227</guid>
      <dc:creator>Tom Emerson</dc:creator>
      <dc:date>2000-10-25T06:42:46Z</dc:date>
    </item>
  </channel>
</rss>

