Suggestion: if you're doing this, at least disable password login for SSH, and use keys instead. Otherwise, as others have already observed, your system is a single password away from being wide open. With keys, at least the attacker needs to filch your identity key first.
Securing SSH: in /etc/ssh/sshd_config, set the lines
To automatically run sudo, you can put the command in your
.bashrc file (or
.profile if you're running other shells; Ubuntu also has dash in addition to bash. See this article).
# This is my .bashrc. There are many like it, but this is mine.
# You can also set some variables if you ever need them.
Then to also remove the password from
su, you need to run
visudo on each server and add, say,
Cmnd_Alias INSECURE_ROOTSHELL = /bin/su
ubuntu ALL=(ALL) NOPASSWD: INSECURE_ROOTSHELL