Security is multi dimensional matter, you can't just rely on rules like "no ssh to root" or "password should be more than 20 characters".
In my case ssh is allowed from 2 IP addresses (much more useful rule then "no ssh to root "btw!) with key auth (passwd auth disabled). Don't see any problem with that.
Security is multi dimensional matter, you can't just rely on rules like "no ssh to root" or "password should be more than 20 characters".
In my case ssh is allowed from 2 IP addresses (much more useful rule then "no ssh to root "btw!) with key auth (passwd auth disabled). Don't see any problem with that.