On Tue, Aug 02, 2005 at 09:43:17PM -0400, Colin wrote:
> Neither is what I was thinking of, but they're quite similar.   
> LoginGraceTime means if nobody logged in within 10 minutes of the  
> connection being opened, then it will be closed.  I don't know  
> exactly what MaxAuthTries does, but I imagine after the sixth invalid  
> login, the connection would  be closed.
> 

Yes, and if the failure reaches half the number, all further failures
will be logged. In the case of
  MaxAuthTries 6
It means that the first three failures will go unnoticed, the fourth
through sixth logged, and the connection closes after that. 

There is, unfortunately, not an option in sshd_config to allow for the
behaviour you specified, where after a password failure, the next
prompt comes up delayed by five seconds. Perhaps if should be put as a
feature request (=.

Your best bet against brute forcing sshd is
  1) Not allowing password login at all
    or
  2) Use some sort of IDS coupled with a firewall rule to block the
     particular host after multiple login failures. But even that
     won't stop a distributed brute force. But then again, if you are
     guarding a system that really demands that much security against
     a determined cracker, you really should consider NOT putting the
     system on the internet. 
    or
  3) Maybe port-knocking? Note that just by running ssh on a 
     non-standard port, you probably are avoiding most of the 5|<|21p7
     kiddie attacks... again, only someone who really wants in on your
     system will take the effort to locate where sshd is listening. 

> I found this site, check it out.  It's for Red Hat (Gentoo is  
> better!), but it's the same SSHd:
> http://www.faqs.org/docs/securing/chap15sec122.html
-- 
It's easy to come up with new ideas; the hard
part is letting go of what worked for you two
years ago, but will soon be out of date.
        -- Roger Von Oech
Sortir en Pantoufles: up 2 days,  9:25
-- 
gentoo-user@gentoo.org mailing list

Reply via email to