check_by_ssh question

Matt Pounsett matt.pounsett at cira.ca
Wed Mar 24 23:24:27 CET 2004


On Wed, 24 Mar 2004, Andreas Ericsson wrote:

> If you get hacked someplace, you're network is dead and there's nothing 
> you can do about it.

Well.. assuming it was all intelligently configured, this is overstating
things significantly.  It's quite easy to limit one's passwordless ssh keys to
ONLY run certain commands, and to prevent the invocation of shells and so
forth, thus preventing those keys from being used to invade other machines.

-- 
Matt Pounsett                 CIRA - Canadian Internet Registration Authority
Technical Support Programmer                    350 Sparks Street, Suite 1110
matt.pounsett at cira.ca                                 Ottawa, Ontario, Canada
613.237.5335 ext. 231                                      http://www.cira.ca



-------------------------------------------------------
This SF.Net email is sponsored by: IBM Linux Tutorials
Free Linux tutorial presented by Daniel Robbins, President and CEO of
GenToo technologies. Learn everything from fundamentals to system
administration.http://ads.osdn.com/?ad_id=1470&alloc_id=3638&op=click
_______________________________________________
Nagios-users mailing list
Nagios-users at lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/nagios-users
::: Please include Nagios version, plugin version (-v) and OS when reporting any issue. 
::: Messages without supporting info will risk being sent to /dev/null





More information about the Users mailing list