Unfortunately, I have no access to that person anymore.

Based on your experience, there were no issues that you have run into with
such deployment?

-v


On Fri, Mar 3, 2017 at 9:07 AM, Robert Citek <[email protected]> wrote:

> I would ask the person who told you that this is not secure to elaborate.
> I have worked with a number of companies that do this. So I am as curious
> as you are.
>
> Regards,
> - Robert
>
> On Fri, Mar 3, 2017 at 9:01 AM VY <[email protected]> wrote:
>
> > Dear All:
> >
> > I am supporting a client that has product linux PCs running in the field.
> > The person before me has built a reverse SSH tunnel (connection initiated
> > by the device itself back to us and the connection is monitored by
> > autossh).
> >
> > I was told this is not secure.   I am no expert in security.  What are
> the
> > possible issues with this approach?  And what would be a more secure
> > mechanism than reverse SSH?
> >
> > thanks
> >
> > -v
> > _______________________________________________
> > PLUG mailing list
> > [email protected]
> > http://lists.pdxlinux.org/mailman/listinfo/plug
> >
> _______________________________________________
> PLUG mailing list
> [email protected]
> http://lists.pdxlinux.org/mailman/listinfo/plug
>
_______________________________________________
PLUG mailing list
[email protected]
http://lists.pdxlinux.org/mailman/listinfo/plug

Reply via email to