Re: OpenSSH max auth tries issue

2015-07-23 Thread Xin Li
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On 07/23/15 07:22, Mike Tancsa wrote: > On 7/17/2015 3:19 PM, Mike Tancsa wrote: >> -- >> https://kingcope.wordpress.com/2015/07/16/openssh-keyboard-interactiv e-authentication-brute-force-vulnerability-maxauthtries-bypass/ >> >> Wi

Re: OpenSSH max auth tries issue

2015-07-23 Thread Mike Tancsa
On 7/17/2015 3:19 PM, Mike Tancsa wrote: > -- > https://kingcope.wordpress.com/2015/07/16/openssh-keyboard-interactive-authentication-brute-force-vulnerability-maxauthtries-bypass/ > With this vulnerability an attacker is able to request as many password > prompts limited by the “lo

Re: OpenSSH max auth tries issue

2015-07-21 Thread Roger Marquis
Brett Glass wrote: Because a potential intruder can establish multiple or "tag-teamed" TCP sessions (possibly from different IPs) to the SSH server, a per-session limit is barely useful and will not slow a determined attacker. A global limit might, but would enable DoS attacks. If you run ssh

Re: OpenSSH max auth tries issue

2015-07-20 Thread Brett Glass
Because a potential intruder can establish multiple or "tag-teamed" TCP sessions (possibly from different IPs) to the SSH server, a per-session limit is barely useful and will not slow a determined attacker. A global limit might, but would enable DoS attacks. --Brett Glass At 01:19 PM 7/17/20

Re: OpenSSH max auth tries issue

2015-07-18 Thread Jason Hellenthal
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 It wouldn't pass the pf overload rules if set correctly, that's just obvious. ipfw on the other hand I'm either not that conversed on and with the lack of named tables I would think it isn't going to catch it like pf would. It's trivial to just ad

Re: OpenSSH max auth tries issue

2015-07-18 Thread Mark Felder
On Fri, Jul 17, 2015, at 14:19, Mike Tancsa wrote: > Not sure if others have seen this yet > > -- > > > https://kingcope.wordpress.com/2015/07/16/openssh-keyboard-interactive-authentication-brute-force-vulnerability-maxauthtries-bypass/ > > "OpenSSH has a default value of six

OpenSSH max auth tries issue

2015-07-17 Thread Mike Tancsa
Not sure if others have seen this yet -- https://kingcope.wordpress.com/2015/07/16/openssh-keyboard-interactive-authentication-brute-force-vulnerability-maxauthtries-bypass/ "OpenSSH has a default value of six authentication tries before it will close the connection (the ssh cli