Dear All:

I am supporting a client that has product linux PCs running in the field.
The person before me has built a reverse SSH tunnel (connection initiated
by the device itself back to us and the connection is monitored by autossh).

I was told this is not secure.   I am no expert in security.  What are the
possible issues with this approach?  And what would be a more secure
mechanism than reverse SSH?

thanks

-v
_______________________________________________
PLUG mailing list
[email protected]
http://lists.pdxlinux.org/mailman/listinfo/plug

Reply via email to