Mark,
This is interesting- it points to a missing part of my description of
the situation. I guess this would be called the "security model" of
this situation: what is trusted and what is not trusted.
In this situation, the commands (running as "administrator) executed by
SSH on behalf of the re
John,
This is coming from a different angle, but have you thought of tightening
security using the SSH server instead? I think you are considering opening
up an interactive session using SSH in order to execute arbitrary commands
on the remote system. However, you can configure ssh on a per-acco
2 matches
Mail list logo