Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
egil
on April 28, 2014
|
parent
|
context
|
favorite
| on:
SSH Kung Fu
In that case, you would lock down the key so it could only be used to execute the strict subset of commands to do its job. It is very common practice, but is not mentioned at all in the blog post.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search: