On Sat, 10 Dec 2005, wwp wrote:
Key based authentication is the right way to go. You should disable root ssh access completely.
So long as the machine with the kay is also very well protected or it is just as exposed as if it were directly.
BTW, is there a way to make ssh allowing root access from a specific interface (local for instance) and denying it from other ones (external)?
man securetty -- Cheers Res