On Sun, 17 Feb 2002, Kevin Steves wrote: > agreed, rsync over ssh is a good and a fairly common way to push data from > inner to more outer security perimeters. in addition to the ssh server > configuration, careful use and configuration of the authentication agent > may make it reasonable to do this unattended.
[Sorry, missed the original post, but figured this was worth throwing in:] If you're using SSH, you should make every attempt to restrict the daemon to accepting version 2 of the protocol *only*. The v1 fallback stuff will allow an attacker to use the horribly broken 1.5 stuff. Paul ----------------------------------------------------------------------------- Paul D. Robertson "My statements in this message are personal opinions [EMAIL PROTECTED] which may have no basis whatsoever in fact." _______________________________________________ Firewalls mailing list [EMAIL PROTECTED] http://lists.gnac.net/mailman/listinfo/firewalls
