SSH Security
Scot L. Harris
webid at cfl.rr.com
Sun Dec 11 00:16:12 UTC 2005
On Sat, 2005-12-10 at 16:40, Res wrote:
> On Sat, 10 Dec 2005, wwp wrote:
>
> >> Key based authentication is the right way to go. You should disable
> >> root ssh access completely.
>
> So long as the machine with the kay is also very well protected or it is
> just as exposed as if it were directly.
That should go with out saying. You should still use a pass phrase with
your keys.
More information about the fedora-list
mailing list