On a server I have a public key auth only for root account. Is there any point of logging in with a different account?

  • @[email protected]
    link
    fedilink
    67 days ago

    Doesn’t even have to be the key necessarily. Could get in via some exploit first. Either way taking over the machine became a 2-step process.

    • ☂️-
      link
      fedilink
      2
      edit-2
      7 days ago

      you would need 2 different exploits for 2 different types of attack though.

      its always good to have an extra layer of “oh shit i need another exploit”. unless your threat modelling includes nation-states, that is.

      • @[email protected]
        link
        fedilink
        27 days ago

        Unless your threat modelling includes nation-states

        At which point you should have a handful of extra layers