Hi,

On Sun, 16 Sep 2007 22:25:07 +0200 Alexander Skwar
<[EMAIL PROTECTED]> wrote:

> A "/etc/init.d/sshd stop" won't kill any SSH sessions. It'll
> simply the sshd "master process". Because of that, additional
> logins won't be possible.

An /etc/init.d/sshd stop/restart can very well fail. Depending on in
what state this happens, it might stop accepting connections. Typical
conditions might be that relevant changes on-disk occurred, e.g. PAM
libraries, libc or similar libs that might dl() things.

OTOH, if signal handling is broken, the KILL might traverse to the
connection handling forked child. And that's enough to kick you out.

So I would definately prefer to always have a guaranteed working sshd
running (I find OpenVPN/telnet a bit strange and an unnecessary
potential security hole).

Your absolutely right in that restarting immediately or delayed after
logging out of all sessions doesn't matter at all. But it's wrong that
it *can't* occur that you kill your current session as well. So the
delay doesn't make any specific sense here. It might reduce the risk of
a zombie master process of sshd, but I don't see much evidence. OTOH,
you lose the possibility of fixing restart problems within the running
session. So you have to weight the risks. The real problem, however,
can only be overcome by another way to login. Firing up another
instance of sshd (on a different port) is just a matter of one simple
command, so I definately prefer that.

-hwh
-- 
[EMAIL PROTECTED] mailing list

Reply via email to