On Mon, Oct 03, 2005 at 11:30:45AM -0500, Steve Block wrote:
> So does this seem like a viable way to avoid the current generation of
> SSH attacks? Of course nothing is bulletproof but am I actually more
> secure than before?

I'd argue, yes. By removing an authentication method that you are not
using, you are reducing the number of quantity of code that is being
executed and therefore reducing the quantity of vulnerabilities that may
be present.

-- 
Jon Dowland
http://jon.dowland.name/


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to