snmp over internet "best practice"
Hugo van der Kooij
hvdkooij at vanderkooij.org
Mon Aug 27 19:23:24 CEST 2007
On Mon, 27 Aug 2007, Andreas Ericsson wrote:
> If security is your primary concern, you should use ssh with shared key
> authentication as much as you possibly can, and make sure to use one key
> per command you want to execute (read the SSH manpage carefully on how to
> set this up). This can quickly become troublesome though, as the keys and
> commands mount up (maintenance nightmare, but very secure).
If you take the human factor in the equasion you know that this 1 key per
command is very propably not the safest thing to do. It is too easy to
make an error.
Hugo.
--
hvdkooij at vanderkooij.org http://hugo.vanderkooij.org/
This message is using 100% recycled electrons.
Some men see computers as they are and say "Windows"
I use computers with Linux and say "Why Windows?"
(Thanks JFK, for this quote of George Bernard Shaw.)
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems? Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
_______________________________________________
Nagios-users mailing list
Nagios-users at lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/nagios-users
::: Please include Nagios version, plugin version (-v) and OS when reporting any issue.
::: Messages without supporting info will risk being sent to /dev/null
More information about the Users
mailing list