snmp over internet "best practice"

Hugo van der Kooij hvdkooij at vanderkooij.org
Mon Aug 27 19:23:24 CEST 2007


On Mon, 27 Aug 2007, Andreas Ericsson wrote:

> If security is your primary concern, you should use ssh with shared key
> authentication as much as you possibly can, and make sure to use one key
> per command you want to execute (read the SSH manpage carefully on how to
> set this up). This can quickly become troublesome though, as the keys and
> commands mount up (maintenance nightmare, but very secure).

If you take the human factor in the equasion you know that this 1 key per 
command is very propably not the safest thing to do. It is too easy to 
make an error.

Hugo.

-- 
 	hvdkooij at vanderkooij.org	http://hugo.vanderkooij.org/
 	    This message is using 100% recycled electrons.

 	Some men see computers as they are and say "Windows"
 	I use computers with Linux and say "Why Windows?"
 	(Thanks JFK, for this quote of George Bernard Shaw.)

-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >>  http://get.splunk.com/
_______________________________________________
Nagios-users mailing list
Nagios-users at lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/nagios-users
::: Please include Nagios version, plugin version (-v) and OS when reporting any issue. 
::: Messages without supporting info will risk being sent to /dev/null





More information about the Users mailing list