On Sat, 2005-12-10 at 16:40, Res wrote: > On Sat, 10 Dec 2005, wwp wrote: > > >> Key based authentication is the right way to go. You should disable > >> root ssh access completely. > > So long as the machine with the kay is also very well protected or it is > just as exposed as if it were directly. That should go with out saying. You should still use a pass phrase with your keys.