Dimitry Andric <d...@freebsd.org> wrote:

> For each incoming IP address, sshd does a reverse lookup, and if that
> results in a hostname, it does another lookup of that hostname, to see
> if *that* result matches the original incoming IP address.  If it does
> not, you get this scary warning in syslog about a "possible break-in
> attempt!".
>
> In my opinion, this is fairly misleading, since almost always the actual
> cause is badly configured DNS, a very common occurrence.  In addition,
> matching forward and reverse DNS records is no guarantee at all that the
> incoming IP address is in any way trustworthy.

I'm not sure which version this made it into, but they actually removed this
over 2 years ago. It's not in the openssh that ships with FreeBSD 11.2:

 | commit e690fe85750e93fca1fb7c7c8587d4130a4f7aba
 | Author: dtuc...@openbsd.org <dtuc...@openbsd.org>
 | Date:   Wed Jun 15 00:40:40 2016 +0000
 |
 |     upstream commit
 |
 |     Remove "POSSIBLE BREAK-IN ATTEMPT!" from log message
 |     about forward and reverse DNS not matching.  We haven't supported 
IP-based
 |     auth methods for a very long time so it's now misleading.  part of 
bz#2585,
 |     ok markus@
 |
 |     Upstream-ID: 5565ef0ee0599b27f0bd1d3bb1f8a323d8274e29

cheers, Jamie
_______________________________________________
freebsd-security@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to