Re: [CentOS] How to create a secure user only for ssh login?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



On Wed, Jun 14, 2006 12:38:51 PM -0500, Les Mikesell
(lesmikesell@xxxxxxxxx) wrote:

> On Wed, 2006-06-14 at 18:56 +0200, M. Fioretti wrote:
> 
> > I've read on several howtos that one way to make ssh more secure,
> > or at least reduce the damage if somebody breaks in, is to NOT
> > allow direct ssh login from root, but allow logins from another
> > user. So you have to know two passwords in order to do any real
> > damage.
[...]
> Normally you would want people to use their own account for the
> initial login - and to use good passwords so a dictionary attack
> isn't likely to work.

I agree, but normal users have no reason to exist on that particular
box. It is a web and email server, nothing more. Even email is handled
via virtual users.

If I create another Unix account (my_aux_login), it will only be so I
can disable ssh directly as root and then ssh into the box with that
login, to immediately su to root for system administration. So my
original question means:

(must I)/can I reduce as much as possible the privileges/access rights
of the my_aux_login account? so that if somebody breaks _its_
password, it won't be able to do anything, including browsing around
to see what's installed?

If yes, how?

	Marco

-- 
Marco Fioretti                    mfioretti, at the server mclink.it
Fedora Core 3 for low memory      http://www.rule-project.org/

If you want to make God smile, make a plan - Anonymous
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux