On Mon, 27 Aug 2007, Andreas Ericsson wrote: > If security is your primary concern, you should use ssh with shared key > authentication as much as you possibly can, and make sure to use one key > per command you want to execute (read the SSH manpage carefully on how to > set this up). This can quickly become troublesome though, as the keys and > commands mount up (maintenance nightmare, but very secure).
If you take the human factor in the equasion you know that this 1 key per command is very propably not the safest thing to do. It is too easy to make an error. Hugo. -- [EMAIL PROTECTED] http://hugo.vanderkooij.org/ This message is using 100% recycled electrons. Some men see computers as they are and say "Windows" I use computers with Linux and say "Why Windows?" (Thanks JFK, for this quote of George Bernard Shaw.) ------------------------------------------------------------------------- This SF.net email is sponsored by: Splunk Inc. Still grepping through log files to find problems? Stop. Now Search log events and configuration files using AJAX and a browser. Download your FREE copy of Splunk now >> http://get.splunk.com/ _______________________________________________ Nagios-users mailing list Nagios-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/nagios-users ::: Please include Nagios version, plugin version (-v) and OS when reporting any issue. ::: Messages without supporting info will risk being sent to /dev/null