jzimmerlin wrote:
PHPMyAdmin is securable. There are a few ways of doing it too. Here's another:
1. In PHPMyAdmin's virtual host settings, restrict access to localhost (127.0.0.1)
2. Then, when you want to access PHPMyAdmin, SSH tunnel into your Linode
Code:
ssh -L 8080:localhost:80 yourusername@yourdomain.com
3. And type
http://localhost:8080/phpmyadmin in your web browser
This approach requires an SSH connection to your Linode in order to access PHPMyAdmin. If you have SSH keys (let's hope you do), it's far less likely someone could hack into PHPMyAdmin then.
That helps, thanks.
Thanks to the other posts also.
I'm actually using nginx and I've got my phpmyadmin set up as a virtual server with its own subdomain. But it's still accessible via web if you know the domain... and then all I have is the fairly weak (from what I've read) login barrier to keep ppl out.
I'm not entirely clear on how to set up the ssh in nginx but can play with it till something works.
I wonder what happens if I just "break" the virtual server by putting a string of nonsense in the config file or something. And just remove that when I want to use phpmyadmin.
(Probably fill up an error log somewhere? ... or break my nginx. I think I'll not try that.)