#22111: dropbear listens on public ipv6 connection after process restart = 
remote
SSH access (vulnerability mitigation included)
-----------------------+----------------------------------
  Reporter:  Aditza    |      Owner:  developers
      Type:  defect    |     Status:  new
  Priority:  high      |  Milestone:
 Component:  packages  |    Version:  Chaos Calmer 15.05
Resolution:            |   Keywords:  dropbear, remote ssh
-----------------------+----------------------------------

Comment (by anonymous):

 Replying to [comment:2 Aditza]:
 > the security of critical system services, such as telnet/ssh and luci
 web admin, should not rely imho on the default firewall rules... they
 should have explicit DROP rules for wan.
 >
 > I think that those default rules should be considered more of a safety
 net for cases of "oh, shit! why is this open?" instead of the main line of
 defense.
 I agree with you this should not be open just like it's not for IPv4.

--
Ticket URL: <https://dev.openwrt.org/ticket/22111#comment:4>
OpenWrt <http://openwrt.org>
Opensource Wireless Router Technology
_______________________________________________
openwrt-tickets mailing list
[email protected]
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-tickets

Reply via email to