![]() We need to tell the router where to send our connection when we try to log in with SSH. One side effect is computers on the outside can’t directly address internal computers. ![]() These split a public IP into a subnetwork of private IPs. Expose SSH to the internetĪlmost all of you will be behind a NAT router. It’s battle-tested in a way that Kodi could only dream. ![]() OpenSSH has millions of active deployments. If SSH can be insecure, why are we using it at all? We could just forward ports through to Kodi… But I just wouldn’t want to risk exposing it directly to the internet. Use key-based auth, disable password auth, use a non-standard port, install fail2ban, etc. Before we make this accessible on the internet, we need to make the SSH server secure.
0 Comments
Leave a Reply. |