Disable root password and gain su sudo with no password
- user password strength is same as root's password, and one must 1st login in-order to use su/sudo
- root password will be disabled - thus anyone who will try login using root user will get denied... this will require anyone who wants to login to be familiar with the user name prior, which gives further security strength.
- once local security is compromised, a root password is meaningless if a live-cd (etc) is in hands, or as a wise user added - a baseball bat...
1. allow user to sudo :
1.1 add "<user> <machine_name/ALL>=(ALL) ALL" to /etc/sudoers - must use visudo to edit. example (type visudo at bash prompt and edit - the command s will start edit mode of vi, Esc will end it:wq will save the file and quit, while :q will just quit visudo):
> visudo #allow user ziggy sudo from local machine only (my''machine''name = HOSTNAME in rc.conf): ziggy my''machine''name=(ALL) ALL #allow user arch sudo from anywhere (local/net): arch ALL=(ALL) ALL
2. disable root and gain su/sudo with no password :
2.1 add group 'wheel' to installed accounts:
gpasswd -a <username> wheel
2.2 allow members of 'wheel' group to use su (it will be passwordless since root will be disabled) by adding the following line to both /etc/pam.d/su & /etc/pam.d/sudo :
auth sufficient pam''wheel.so trust use''uid
2.3 to allow wheel users login via local only, add the following line to /etc/security/access.conf :
-:wheel:ALL EXCEPT LOCAL
2.4 disable the root account by removing it's password.
passwd -l root
3. if you ever need to reacitvate root, just run
sudo passwd root
thats it. enjoy your new passwordless root :)