kenCode@Agorise on Nostr: ⚠️🚨⚠️🚨⚠️🚨 PSA for relay/node admins: Obviously we cannot disable ...
Published at
2024-07-02 17:22:19Event JSON
{
"id": "4a95f8fcdcf117c07c19e903fd1373fd70af042c196d69d937b2aa7ac501fec5",
"pubkey": "5f1ab3a3176dccfa3396e553e811a388fafef74cee6d88e5c3929333c43dcb78",
"created_at": 1719940939,
"kind": 1,
"tags": [],
"content": "⚠️🚨⚠️🚨⚠️🚨 \nPSA for relay/node admins: \n \nhttps://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server \n \nObviously we cannot disable ssh, so we will implement port knock. A bunch of firewall rules will be added as well to deter any attacks. \n \nWithout intervention, we are leaving root access wide open for any hacker. This is seriously bad cyberpolygon shit imo. \n ",
"sig": "bdae9b2c6d9aeffa55392ef7f2bcadd3326c4b2eee74b1e26848ca2049ad635753fa086a288cc3e0d09f480f62b4b0bc0331eb757d555a5093619d476ae41c4c"
}