Re: OpenSSH max auth tries issue

2015-07-21 Thread Roger Marquis
Brett Glass wrote: Because a potential intruder can establish multiple or "tag-teamed" TCP sessions (possibly from different IPs) to the SSH server, a per-session limit is barely useful and will not slow a determined attacker. A global limit might, but would enable DoS attacks. If you run ssh

FreeBSD Security Advisory FreeBSD-SA-15:13.tcp

2015-07-21 Thread FreeBSD Security Advisories
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 = FreeBSD-SA-15:13.tcpSecurity Advisory The FreeBSD Project Topic:

Re: FreeBSD Security Advisory FreeBSD-SA-15:13.tcp

2015-07-21 Thread Peter Rosa
Hi, V. Solution Perform one of the following: 3) To update your vulnerable system via a source code patch: The following patches have been verified to apply to the applicable FreeBSD release branches. c) Recompile your kernel as described in https://www.FreeBSD.org/handbook/kernelconfig.ht

Re: FreeBSD Security Advisory FreeBSD-SA-15:13.tcp

2015-07-21 Thread gabor
IV. Workaround No workaround is available, but systems that do not provide TCP based service to untrusted networks are not vulnerable. Note that the tcpdrop(8) utility can be used to purge connections which have become wedged. For example, the following command can be used to generate comman