8
3
As per security best practices one should not allow root login over SSH with password or keys. Instead, sudo should be used.
However, if one wants to use SSH (SFTP) for remote editing of server configuration files, like ones living in /etc (Apache, Cron, you name it), how this should be done?
Can root-accesible file remote editing over SFTP be compatible with the security best practices
How one should set file permissions, user groups and such that the security best practices are followed
Currently I use passphrase protected public key authentication to login as root, but I am not sure if there is something more secure I could do, so that root facing SSH logins could be disabled altogether.
The server is Ubuntu 12.04.
So what is your client OS? Please be more specific in your question! – SPRBRN – 2013-04-11T09:49:36.573
I fail to see why direct key-based root login should be less secure than sudo. – jpc – 2013-06-25T07:59:03.503