On Mon, Dec 21, 2015, at 11:05 AM, Billy Youdelman wrote:
> Kyle Sluder wrote:
> 
> > It's puzzling that Macs whose audio playback you rely on are exposed to
> > a network where they can be directly targeted for SSH bruteforce. If
> > these are workstations, best practice would likely be to place them
> > behind a firewall. If remote access is necessary, a VPN seems
> > appropriate.
> 
> Or, at least listen on some port other than 22.

If nothing is sparing the machines from a brute-force attack on port 22,
there's almost certainly nothing protecting them against a trivial
port-scan.

Moral of the story is: don't leave unhardened machines open to the world
on _any_ port.

--Kyle Sluder
 _______________________________________________
Do not post admin requests to the list. They will be ignored.
Coreaudio-api mailing list      ([email protected])
Help/Unsubscribe/Update your Subscription:
https://lists.apple.com/mailman/options/coreaudio-api/archive%40mail-archive.com

This email sent to [email protected]

Reply via email to