Thread Previous • Date Previous • Date Next • Thread Next |
I'd also add that from a security standpoint, it seems like a better option for it to just fail. If I'm using injected files for a hardening purpose (sshd config, ssh keys, pam configuration, etc) and the box comes up without those modifications, my instance is not as secure as I intended. Not sure anyone is doing that yet, just a possible use case. Thanks, Jarret Raim
Thread Previous • Date Previous • Date Next • Thread Next |