:Let's put this in perspective.  Say a hypothetical sysadmin were to
:disable any and all authentication on his SSH server.  And that
:someone then used SSH from your network to run code that sysadmin
:didn't like on that machine.  Would you then consider it reasonable if
:the sysadmin proposed:
:
:   The only responsible thing to do is filter port 22, smarthost for
:   your users, and inform them about using the alternate submission
:   port with authenticated SSH in order to work with enterprise SSH
:   servers - or IPSec VPNs, for that matter. This is simply the best
:   practice, at this point in time.
:

Apples & oranges;  thanks for playing, please try again...

Reply via email to