Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Those connection attempts wouldn't ever reach the daemon though, let alone get to preauth. So how would an exploitation attempt even be distinguishable from, say, a harmless random password guess if neither ever gets to see the daemon?


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: