In linux, root has almost all permissions. Once the root user password is leaked, it will be a fatal threat to the server. it is prohibited for root users to log on remotely through ssh, in this way, even if the root user password is leaked, the server security can be guaranteed. 1: create a common user doiido and add it to the corresponding group. note: You must create a new user here. Otherwise, you will not be able to log on to the server via remote ssh # groupadddoiido # useradd-g
In linux, root has almost all permissions. Once the root user password is leaked, it will be a fatal threat to the server. it is prohibited for root users to log on remotely through ssh, in this way, even if the root user password is leaked, the server security can be guaranteed.
1: create a common user, doiido, and add it to the corresponding group.
Note: here
RequiredCreate a new user. Otherwise, you will be unable to log on to the server through remote ssh.
# Groupadd doiido
# Useradd-g doiido
Change doiido password
# Passwd doiido
2: modify the sshd_config file
# Sed-I's/# PermitRootLogin yes/PermitRootLogin no/'/etc/ssh/sshd_config
3: Restart the ssh service.
# Service sshd restart
In this way, even if the root user password is disclosed, other users cannot directly connect to the server through the root user.