ubuntu-phone team mailing list archive
Mailing list archive
Re: Is ubuntu phone resistant to vault 7 attacks?
Am Donnerstag, den 09.03.2017, 16:26 +0000 schrieb Unix One:
> On 03/09/2017 05:56 AM, A. James Lewis wrote:
> > The ports you mention don't appear to be open on a default build,
> > with the exception of 53, which surprises me, but still, it is only
> > bound to loopback, so it would be hard to attack remotely.
> What do you mean by "default build"? I'm on rc-proposed on mako and
> is open on 0.0.0.0. I don't believe I've done anything to cause
> Disabling the developer mode doesn't make it go away.
the port is closed by default, the only way this is not the case is
because you either once called "android-gadget-service enable ssh" or
hacked around on the phone in writable mode to turn it on. there is no
UI way to enable it and it has always been off on fresh installs ...
that said... if you called the above command to turn it on, the setup
indeed persists unless you wipe the phone or use the builtin mechanism
(android-gadget-service disable ssh) to turn it off again.
Description: This is a digitally signed message part