Skip Navigation

I didn't know you were supposed to disable root user...

Background: 15 years of experience in software and apparently spoiled because it was already set up correctly.

Been practicing doing my own servers, published a test site and 24 hours later, root was compromised.

Rolled back to the backup before I made it public and now I have a security checklist.

166 comments
  • I don't think I'm ever opening up anything to the internet. It's scary out there.

    I don't trust my competence, and if I did, I dont trust my attention to detail. That's why I outsource my security: pihole+firebog for links, ISP for my firewall, and Tailscale for tunnels. I'm not claiming any of them are the best, but they're all better than me.

  • This sounds like something everyone should go through at least once, to underscore the importance of hardening that can be easily taken for granted

  • Although disabling the root user is a good part of security, leaving it enabled should not alone cause you to get compromised. If it did, you were either running a very old version of OpenSSH with a known flaw, or, your chosen root password was very simple.

    • The latter. It was autogenerated by the VPS hosting service and I didn't think about it.

      • It should be a serious red flag that your VPS host is generating root passwords simple enough to get quickly hacked.

166 comments