On Fri, May 25, 2012 at 2:56 PM, Alan Malloy <a...@malloys.org> wrote:
> This may be good advice in some cases (eg when all network access to
> your server is "trusted"), but on a lot of production servers it
> strikes me as very dangerous to apply this suggestion carelessly.
I was assuming that network access is pretty locked down on production
servers. For example, the port on which we listen is only open on an
internal IP and therefore only within a small, tightly controlled
subnet when we have VPN active. There's no external IP access open.

> This way the only people who can connect remotely are those who have
> permission to get a local application (usually sshd) to forward the
> traffic to the localhost interface on their behalf.

I agree that's a nice, secure alternative.
-- 
Sean A Corfield -- (904) 302-SEAN
An Architect's View -- http://corfield.org/
World Singles, LLC. -- http://worldsingles.com/

"Perfection is the enemy of the good."
-- Gustave Flaubert, French realist novelist (1821-1880)

-- 
You received this message because you are subscribed to the Google
Groups "Clojure" group.
To post to this group, send email to clojure@googlegroups.com
Note that posts from new members are moderated - please be patient with your 
first post.
To unsubscribe from this group, send email to
clojure+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/clojure?hl=en

Reply via email to