@[email protected] to [email protected] • edit-27 days agoWhy disable ssh login with root on a server if I only log in with keys, not password?message-square82fedilinkarrow-up1106arrow-down14file-text
arrow-up1102arrow-down1message-squareWhy disable ssh login with root on a server if I only log in with keys, not password?@[email protected] to [email protected] • edit-27 days agomessage-square82fedilinkfile-text
On a server I have a public key auth only for root account. Is there any point of logging in with a different account?
minus-square@[email protected]linkfedilink6•7 days agoDoesn’t even have to be the key necessarily. Could get in via some exploit first. Either way taking over the machine became a 2-step process.
minus-square☂️-linkfedilink2•edit-27 days agoyou would need 2 different exploits for 2 different types of attack though. its always good to have an extra layer of “oh shit i need another exploit”. unless your threat modelling includes nation-states, that is.
minus-square@[email protected]linkfedilink2•7 days ago Unless your threat modelling includes nation-states At which point you should have a handful of extra layers
Doesn’t even have to be the key necessarily. Could get in via some exploit first. Either way taking over the machine became a 2-step process.
you would need 2 different exploits for 2 different types of attack though.
its always good to have an extra layer of “oh shit i need another exploit”. unless your threat modelling includes nation-states, that is.
At which point you should have a handful of extra layers