Public bug reported:

---
**Issue Report: Unable to Reset `MaxAuthTries` in OpenSSH-Server**
---

I find myself increasingly frustrated as I reluctantly open this issue
report. This specific issue is consuming precious time I simply don’t
have. There appears to be no way to reset the `MaxAuthTries` counter
once it has been exceeded by a client due to incorrect attempts, such as
when PuTTY attempts to reconnect after a password change.

In this scenario, my employee has almost full root access, except for
the ability to modify system files and reboot the server. Despite
numerous attempts, including verification on my part, the `MaxAuthTries`
counter does not reset. It seems there is currently no mechanism to
reset this counter for a specific username. I was able to log in as the
affected user via web TTY provided by the VPS provider, indicating that
the account itself is not physically locked.

**Steps to Reproduce:**
1. Install the current release of `openssh-server`.
2. Set up an account and configure (uncomment) `MaxAuthTries` in 
/etc/ssh/sshd_config to any value, for example, 10.
3. Exceed the configured number of attempts. For good measure, I suggest 
attempting 15 or 20 times.
4. Attempt to reset `MaxAuthTries`. Despite consulting Google and AI resources, 
this task remains impossible.

**What Was Tried to Verify This Issue:**
- `systemctl restart ssh`, `systemctl restart ssh.socket`
- `systemctl disable/enable ssh`, `systemctl disable/enable ssh.socket`
- `apt reinstall openssh-server` (reinstalled multiple times)
- Rebooted client PCs
- Verified client passwords
- `passwd username` from another account, followed by attempting the new 
password on the locked-out account and IP
- Manually logging into the server without providing automatic username and 
password. Still doesn't work, so it's not a password issue, it's a 
openssh-server lockout issue. An undocumented hard lockout mechanism with no 
recourse?

**Observations:**
- The `auth.log` shows the connection attempts, indicating this is not a 
firewall issue. Fail2ban did not ban the IPs, and the IP subnets are 
whitelisted. UFW is not installed.
- Different usernames at different locations (different IPs) were not affected.
- It’s astonishing that there is no way to reset this counter. Not even 
reinstalling `openssh-server` resolves it. This is the most shocking aspect.
- Common suggestions online and in forums recommend modifying 
`/etc/ssh/sshd_config` to double the `MaxAuthTries` value, logging in, and then 
resetting it. This is not feasible as I cannot allow employees to modify system 
files.

**Expected Behavior:**
- It is reasonable to expect a method to reset the `MaxAuthTries` counter. 
While employees cannot modify system files, upper-tier personnel can perform 
almost any other task. I anticipate that there should be a straightforward way 
to reset `MaxAuthTries`, such as through service restart or `openssh-server` 
reinstallation. The current lack of such a method is perplexing.
- Additionally, I’ve observed that when modifying `/etc/ssh/sshd_config` to 
change the port number, a server reboot or `openssh-server` reinstallation is 
required for the changes to take effect. Restarting the service alone does not 
apply the new port number. Why doesn’t restarting `openssh-server` reflect 
these changes? Where are these states being stored?

** Affects: openssh (Ubuntu)
     Importance: Undecided
         Status: New

** Description changed:

- Certainly! Here’s a polished and refined version of your issue report:
- 
  ---
- 
  **Issue Report: Unable to Reset `MaxAuthTries` in OpenSSH-Server**
- 
  ---
  
  I find myself increasingly frustrated as I reluctantly open this issue
  report. This specific issue is consuming precious time I simply don’t
  have. There appears to be no way to reset the `MaxAuthTries` counter
  once it has been exceeded by a client due to incorrect attempts, such as
  when PuTTY attempts to reconnect after a password change.
  
  In this scenario, my employee has almost full root access, except for
  the ability to modify system files and reboot the server. Despite
  numerous attempts, including verification on my part, the `MaxAuthTries`
  counter does not reset. It seems there is currently no mechanism to
  reset this counter for a specific username. I was able to log in as the
  affected user via web TTY provided by the VPS provider, indicating that
  the account itself is not physically locked.
  
  **Steps to Reproduce:**
  1. Install the current release of `openssh-server`.
  2. Set up an account and configure (uncomment) `MaxAuthTries` in 
/etc/ssh/sshd_config to any value, for example, 10.
  3. Exceed the configured number of attempts. For good measure, I suggest 
attempting 15 or 20 times.
  4. Attempt to reset `MaxAuthTries`. Despite consulting Google and AI 
resources, this task remains impossible.
  
  **What Was Tried to Verify This Issue:**
  - `systemctl restart ssh`, `systemctl restart ssh.socket`
  - `systemctl disable/enable ssh`, `systemctl disable/enable ssh.socket`
  - `apt reinstall openssh-server` (reinstalled multiple times)
  - Rebooted client PCs
  - Verified client passwords
  - `passwd username` from another account, followed by attempting the new 
password on the locked-out account and IP
  - Manually logging into the server without providing automatic username and 
password. Still doesn't work, so it's not a password issue, it's a 
openssh-server lockout issue. An undocumented hard lockout mechanism with no 
recourse?
  
  **Observations:**
  - The `auth.log` shows the connection attempts, indicating this is not a 
firewall issue. Fail2ban did not ban the IPs, and the IP subnets are 
whitelisted. UFW is not installed.
  - Different usernames at different locations (different IPs) were not 
affected.
  - It’s astonishing that there is no way to reset this counter. Not even 
reinstalling `openssh-server` resolves it. This is the most shocking aspect.
  - Common suggestions online and in forums recommend modifying 
`/etc/ssh/sshd_config` to double the `MaxAuthTries` value, logging in, and then 
resetting it. This is not feasible as I cannot allow employees to modify system 
files.
  
  **Expected Behavior:**
  - It is reasonable to expect a method to reset the `MaxAuthTries` counter. 
While employees cannot modify system files, upper-tier personnel can perform 
almost any other task. I anticipate that there should be a straightforward way 
to reset `MaxAuthTries`, such as through service restart or `openssh-server` 
reinstallation. The current lack of such a method is perplexing.
  - Additionally, I’ve observed that when modifying `/etc/ssh/sshd_config` to 
change the port number, a server reboot or `openssh-server` reinstallation is 
required for the changes to take effect. Restarting the service alone does not 
apply the new port number. Why doesn’t restarting `openssh-server` reflect 
these changes? Where are these states being stored?

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/2094529

Title:
  Impossible to Reset MaxAuthTries After Lockout

Status in openssh package in Ubuntu:
  New

Bug description:
  ---
  **Issue Report: Unable to Reset `MaxAuthTries` in OpenSSH-Server**
  ---

  I find myself increasingly frustrated as I reluctantly open this issue
  report. This specific issue is consuming precious time I simply don’t
  have. There appears to be no way to reset the `MaxAuthTries` counter
  once it has been exceeded by a client due to incorrect attempts, such
  as when PuTTY attempts to reconnect after a password change.

  In this scenario, my employee has almost full root access, except for
  the ability to modify system files and reboot the server. Despite
  numerous attempts, including verification on my part, the
  `MaxAuthTries` counter does not reset. It seems there is currently no
  mechanism to reset this counter for a specific username. I was able to
  log in as the affected user via web TTY provided by the VPS provider,
  indicating that the account itself is not physically locked.

  **Steps to Reproduce:**
  1. Install the current release of `openssh-server`.
  2. Set up an account and configure (uncomment) `MaxAuthTries` in 
/etc/ssh/sshd_config to any value, for example, 10.
  3. Exceed the configured number of attempts. For good measure, I suggest 
attempting 15 or 20 times.
  4. Attempt to reset `MaxAuthTries`. Despite consulting Google and AI 
resources, this task remains impossible.

  **What Was Tried to Verify This Issue:**
  - `systemctl restart ssh`, `systemctl restart ssh.socket`
  - `systemctl disable/enable ssh`, `systemctl disable/enable ssh.socket`
  - `apt reinstall openssh-server` (reinstalled multiple times)
  - Rebooted client PCs
  - Verified client passwords
  - `passwd username` from another account, followed by attempting the new 
password on the locked-out account and IP
  - Manually logging into the server without providing automatic username and 
password. Still doesn't work, so it's not a password issue, it's a 
openssh-server lockout issue. An undocumented hard lockout mechanism with no 
recourse?

  **Observations:**
  - The `auth.log` shows the connection attempts, indicating this is not a 
firewall issue. Fail2ban did not ban the IPs, and the IP subnets are 
whitelisted. UFW is not installed.
  - Different usernames at different locations (different IPs) were not 
affected.
  - It’s astonishing that there is no way to reset this counter. Not even 
reinstalling `openssh-server` resolves it. This is the most shocking aspect.
  - Common suggestions online and in forums recommend modifying 
`/etc/ssh/sshd_config` to double the `MaxAuthTries` value, logging in, and then 
resetting it. This is not feasible as I cannot allow employees to modify system 
files.

  **Expected Behavior:**
  - It is reasonable to expect a method to reset the `MaxAuthTries` counter. 
While employees cannot modify system files, upper-tier personnel can perform 
almost any other task. I anticipate that there should be a straightforward way 
to reset `MaxAuthTries`, such as through service restart or `openssh-server` 
reinstallation. The current lack of such a method is perplexing.
  - Additionally, I’ve observed that when modifying `/etc/ssh/sshd_config` to 
change the port number, a server reboot or `openssh-server` reinstallation is 
required for the changes to take effect. Restarting the service alone does not 
apply the new port number. Why doesn’t restarting `openssh-server` reflect 
these changes? Where are these states being stored?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/2094529/+subscriptions


-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to