[ale] remote iptables administration

Dan Newcombe Newcombe at mordor.clayton.edu
Wed Oct 8 12:43:26 EDT 2003


I guess that's what I meant...I thought that the host based authentiction
in ssh used the keys as opposed to just imitating what rsh did.

On Wed, 8 Oct 2003, Jason Day wrote:

> On Wed, Oct 08, 2003 at 10:05:50AM -0400, Dan Newcombe wrote:
> > What I need ot be able to do is have the control box tell box a to
> > add/delete this iptable rule, or box b, or both.
> >
> > About the only thing I can think of is ssh with host based authentication,
>
> Key based authentication would be slightly more secure.  Then you don't
> have to worry about an attacker spoofing your hostname or IP.



More information about the Ale mailing list