On Mon, Apr 2, 2012 at 3:27 PM, Scott Kitterman <ubu...@kitterman.com> wrote: > On Monday, April 02, 2012 08:58:20 PM Dale Amon wrote: >> Oh and did I mention that some are only accessible >> by ip or have unique ssh ports for security? I'm >> not very good at remembering those at 3am. > > That's what ~/.ssh/config is for.
Or you can also use /etc/hosts and set IP to a hostname locally. There is very little security a 'unique' port provides because without a firewall that has whitelists over blacklist or are doing port-knocking they'll eventually discover the port, sooner then later IMO. That is if it's a real adversary, I guess for a dumb adversary it would hold them off but I would much rather assume the adversary is smart rather than compromise by assuming they are dumb. -- Ubuntu-devel-discuss mailing list Ubuntu-devel-discuss@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss