Skip to main content

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

2
  • 2
    You should absolutely not change it.
    – Ramhound
    Commented Jun 18 at 19:30
  • 1
    Most of your risk from exposing SSH service to an untrusted network is going to be attacks on either the protocol itself (compromising the integrity or secrecy of the connection) or the authentication process. Exploits that care about the privileges of the main sshd process itself are not particularly common, get patched very quickly, and are usually technical enough that they’re only likely to be used in a targeted attack (as opposed to the low-effort dragnet attacks that will account for essentially all illegitimate traffic you see for the service if it’s exposed to the internet). Commented Jun 19 at 12:02