On Mon, Dec 21, 2015, at 11:05 AM, Billy Youdelman wrote: > Kyle Sluder wrote: > > > It's puzzling that Macs whose audio playback you rely on are exposed to > > a network where they can be directly targeted for SSH bruteforce. If > > these are workstations, best practice would likely be to place them > > behind a firewall. If remote access is necessary, a VPN seems > > appropriate. > > Or, at least listen on some port other than 22.
If nothing is sparing the machines from a brute-force attack on port 22, there's almost certainly nothing protecting them against a trivial port-scan. Moral of the story is: don't leave unhardened machines open to the world on _any_ port. --Kyle Sluder _______________________________________________ Do not post admin requests to the list. They will be ignored. Coreaudio-api mailing list ([email protected]) Help/Unsubscribe/Update your Subscription: https://lists.apple.com/mailman/options/coreaudio-api/archive%40mail-archive.com This email sent to [email protected]
