[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-users] Access control for the xm command


  • From: Thomas Goirand <thomas@xxxxxxxxxx>
  • Date: Wed, 01 Apr 2009 09:06:02 +0800
  • Cc: xen-users@xxxxxxxxxxxxxxxxxxx
  • Delivery-date: Tue, 31 Mar 2009 18:06:50 -0700
  • Domainkey-signature: a=rsa-sha1; c=nofws; d=goirand.fr; h=message-id:date:from:mime-version:cc:subject:references:in-reply-to:content-type:content-transfer-encoding; q=dns; s=postfix; b= QVnifh2PWs2vefP/LUPrWeEcqpFZNGIytM5TvRtjZxH/bovQ9SzI1MQd+jYo1pPd e/bHNOD6hWxOrzxJrbiolQRx6aPamSmZNo5nleMD0iNv5/7tqAutF6vLrkR4mKzx wMxo2kAFduE3aGi8dzRfOHJj7bJa+AIM723MeOxZgFQ=
  • List-id: Xen user discussion <xen-users.lists.xensource.com>
  • Openpgp: id=98EF9A49

Keith Coleman wrote:
> Xen Shell - http://www.xen-tools.org/software/xen-shell/
> 
> 
> Keith Coleman

If you do use that, make sure that you disable port forwarding in your
ssh, otherwise it's very unsecure. I haven't seen anything in the
documentation of that software that talks about it (let me know if I'm
wrong), and to me, that is a big flow and security threat.

Thomas


_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.