Dear All: I am supporting a client that has product linux PCs running in the field. The person before me has built a reverse SSH tunnel (connection initiated by the device itself back to us and the connection is monitored by autossh).
I was told this is not secure. I am no expert in security. What are the possible issues with this approach? And what would be a more secure mechanism than reverse SSH? thanks -v _______________________________________________ PLUG mailing list [email protected] http://lists.pdxlinux.org/mailman/listinfo/plug
