Hacker News new | past | comments | ask | show | jobs | submit login

Realistically what is the risk of ssh being exposed if white listing is done, 2 factor auth and key auth are used? I suppose someone using a zero day, spoofing or from a whitelisted IP may successfully exploit but really?



If you're asking about the risk of exposing Teleport to the Internet, part of the issue is that Teleport does a lot more than SSH.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: