Re: SSH scans vs connection ratelimiting

看板FB_security作者時間19年前 (2006/08/22 10:36), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串8/16 (看更多)
Scot Hetzel wrote: >> However, there apparently are SSH bruteforcers that simply use one >> connection to perform a brute-force attack: >> >> Aug 18 00:00:01 aberdeen sshd[87989]: Invalid user serwis from >> 83.19.113.122 >> Aug 18 00:00:03 aberdeen sshd[88010]: Invalid user serwis from >> 83.19.113.122 >> Aug 18 00:00:05 aberdeen sshd[88012]: Invalid user serwis from >> 83.19.113.122 >> Aug 18 00:00:10 aberdeen sshd[88014]: Invalid user serwis from >> 83.19.113.122 >> Aug 18 00:00:13 aberdeen sshd[88019]: Invalid user serwis from >> 83.19.113.122 >> Aug 18 00:00:14 aberdeen sshd[88021]: Invalid user serwis from >> 83.19.113.122 > It looks as though you need to lower 'MaxAuthTries' in your > sshd_config file, as the default is set to allow six authentication > attempts per connection. I had already lowered this value to '3', which apparantly does not matter at all. I even forgot that I did, which says enough ;) Makes me wonder even more what's happening; even with 3 auth sessions per connection, that would mean only 9 attempts per minute should be possible. I'm seeing >100 attempts per minute, though. -- Pieter _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #14wcsa00 (FB_security)
討論串 (同標題文章)
文章代碼(AID): #14wcsa00 (FB_security)