John Holland <jotihojr@gmail.com> writes: >>> shot. It can't be any worse of a C.F. than the ayufan builds with its >>> pre-allocated user 1000. >> >> Although having a preallocated user 1000 is the standard "Debian Way", the objective being that you can telnet (later SSH) in using that user and then sudo su to get root (fouled up on some versions that don't add user 1000 to sudoers). For quite a long time > > The same effect can be achieved by supplementing the user in question > with the group sudo. With that there is no need to edit sudoers. Presumably the system had a root password set at first install. That is what normally determines whether the first user created at install time is added to the sudo group or not -- having no root password provokes a user with sudo access, so that there is still some way of becoming root. If you're doing it by hand, just run this as root (assuming a user 'phil'): adduser phil sudo As for the question of remote root ssh access -- by default in the debian ssh package that is now only allowed using keys, rather than password, so you need to copy your .pub over to: /root/.ssh/authorized_keys on the target system to get in as root. Cheers, Phil. -- |)| Philip Hands [+44 (0)20 8530 9560] HANDS.COM Ltd. |-| http://www.hands.com/ http://ftp.uk.debian.org/ |(| Hugo-Klemm-Strasse 34, 21075 Hamburg, GERMANY
Attachment:
signature.asc
Description: PGP signature