On Fri, Aug 23, 2013 at 04:42:15PM -0400, John Paul Adrian Glaubitz wrote: > Imagine there is a vulnerability in SSH which has not been fixed > yet for whatever reason. Having SSH run in this situation all the > time would make the machine a target for possible attacks. If all I have to do is make a connection to port 22 to start the service, which would happen as part of an attack anyway, then there's no added security provided by socket activation. -- James GPG Key: 4096R/331BA3DB 2011-12-05 James McCoy <jamessan@debian.org>
Attachment:
signature.asc
Description: Digital signature