On Mon, Apr 2, 2012 at 3:27 PM, Scott Kitterman <ubu...@kitterman.com> wrote:
> On Monday, April 02, 2012 08:58:20 PM Dale Amon wrote:
>> Oh and did I mention that some are only accessible
>> by ip or have unique ssh ports for security? I'm
>> not very good at remembering those at 3am.
>
> That's what ~/.ssh/config is for.

Or you can also use /etc/hosts and set IP to a hostname locally.
There is very little security a 'unique' port provides because without
a firewall that has whitelists over blacklist or are doing
port-knocking they'll eventually discover the port, sooner then later
IMO.  That is if it's a real adversary, I guess for a dumb adversary
it would hold them off but I would much rather assume the adversary is
smart rather than compromise by assuming they are dumb.

-- 
Ubuntu-devel-discuss mailing list
Ubuntu-devel-discuss@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss

Reply via email to