SSH Security

Scot L. Harris webid at cfl.rr.com
Sun Dec 11 00:16:12 UTC 2005


On Sat, 2005-12-10 at 16:40, Res wrote:
> On Sat, 10 Dec 2005, wwp wrote:
> 
> >> Key based authentication is the right way to go.  You should disable
> >> root ssh access completely.
> 
> So long as the machine with the kay is also very well protected or it is 
> just as exposed as if it were directly.

That should go with out saying.  You should still use a pass phrase with
your keys.




More information about the fedora-list mailing list