Hi,
SSL supports client validation that requires a web client to submit a certificate that it owns (has) before a secure connection is established. Such will help to reduce the risk caused by brute force ( super admin user name is known -- root), as well as the risk caused by its default https port.
Actually there are some other methods such as ngix reverse proxy and stunnel. Anyway it is not the best way because the log will be much more confusing --- everything is from localhost.
I wonder if it is doable within perl scripts used by pveproxy. The project is so huge and I don't know what to start with. If a mod is not possible, please provide some clue for me to try.
I was suggested to put a detailed question. And I tried my best.
TY
SSL supports client validation that requires a web client to submit a certificate that it owns (has) before a secure connection is established. Such will help to reduce the risk caused by brute force ( super admin user name is known -- root), as well as the risk caused by its default https port.
Actually there are some other methods such as ngix reverse proxy and stunnel. Anyway it is not the best way because the log will be much more confusing --- everything is from localhost.
I wonder if it is doable within perl scripts used by pveproxy. The project is so huge and I don't know what to start with. If a mod is not possible, please provide some clue for me to try.
I was suggested to put a detailed question. And I tried my best.
TY