I would ask the person who told you that this is not secure to elaborate. I have worked with a number of companies that do this. So I am as curious as you are.
Regards, - Robert On Fri, Mar 3, 2017 at 9:01 AM VY <[email protected]> wrote: > Dear All: > > I am supporting a client that has product linux PCs running in the field. > The person before me has built a reverse SSH tunnel (connection initiated > by the device itself back to us and the connection is monitored by > autossh). > > I was told this is not secure. I am no expert in security. What are the > possible issues with this approach? And what would be a more secure > mechanism than reverse SSH? > > thanks > > -v > _______________________________________________ > PLUG mailing list > [email protected] > http://lists.pdxlinux.org/mailman/listinfo/plug > _______________________________________________ PLUG mailing list [email protected] http://lists.pdxlinux.org/mailman/listinfo/plug
