IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: "too many auth failures"?



On Wed, Oct 27, 2010 at 08:23:19AM +0200, Simon Josefsson wrote:
> Nicolas Williams <Nicolas.Williams%oracle.com@localhost> writes:
> 
> >> (I still think the real problem isn't the server but the client, how's it
> >> managing to try six different keys to get to one server?).
> >
> > Why not?  SSH user public keys are effectively pseudonyms, so you can
> > see why users might have many of them.  Nothing wrong with that...  On
> > the server side you don't want a client sucking up resources testing
> > whether some pubkey or another might work...  so the server says all
> > might work and the client has to actually sign with those keys, and the
> > server also has to implement resource controls pre-authentication
> > (including a timer to disconnect if the client takes too long to
> > authenticate).
> 
> Isn't this another problem?  Often private keys are protected by a
> password or requires a PIN to unlock a smartcard, and iterating to sign
> with all keys becomes a user interface issue quickly.  This is how
> libssh2 works, and I couldn't think of any way to avoid it.

That's a client-side issue.  We're talking about server-side max try
counters.



Home | Main Index | Thread Index | Old Index