IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: "too many auth failures"?



Nicolas Williams <Nicolas.Williams%oracle.com@localhost> writes:

>> (I still think the real problem isn't the server but the client, how's it
>> managing to try six different keys to get to one server?).
>
> Why not?  SSH user public keys are effectively pseudonyms, so you can
> see why users might have many of them.  Nothing wrong with that...  On
> the server side you don't want a client sucking up resources testing
> whether some pubkey or another might work...  so the server says all
> might work and the client has to actually sign with those keys, and the
> server also has to implement resource controls pre-authentication
> (including a timer to disconnect if the client takes too long to
> authenticate).

Isn't this another problem?  Often private keys are protected by a
password or requires a PIN to unlock a smartcard, and iterating to sign
with all keys becomes a user interface issue quickly.  This is how
libssh2 works, and I couldn't think of any way to avoid it.

/Simon



Home | Main Index | Thread Index | Old Index