> On Nov 4, 2017, at 3:14 AM, Petr Štetiar <yn...@true.cz> wrote:
> 
> Hans Dedecker <dedec...@gmail.com> [2017-11-03 13:46:14]:
> 
> Hi,
> 
>> By default dropbear logs to syslog which discloses info about account names
>> when doing connection attempts (e.g. "Bad password attempt for 'engineer'
>> from x.x.x.x:y")
> 
> I don't get it, syslog discloses this information to whom and how?
> 
>> As this facilitates brute force attempts against account names;
> 
> So instead of preventing this brute force attempts, you'll just ignore them
> now? I'm wondering how is the brute forcing easier with syslog logging.
> 
>> make syslog support configurable in order not to leak sensitive info via
>> syslog.
> 
> I think, that those are nice warning messages, reminding you, that you're
> doing it wrong:
> 
> 1. You should use pubkey auth.
> 2. You should limit access to your network services.
> 
> -- ynezz



Also a good point: we eliminated this problem by only allowing key-based logins 
and disallowing passwords.

-Philip


_______________________________________________
Lede-dev mailing list
Lede-dev@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/lede-dev

Reply via email to