IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: An additional-auth mechanism for SSH to protect against scanning/probing attacks
> After some off-list discussions I've given up on trying to use
> existing keying material for the pre-auth, [...] here's the updated
> form.
Is it just me, or do other people see what looks like missing text?
Here's what I'm seeing:
> * In order to encourage adoption by implementers of embedde
> re minimal effort to retrofit to existing SSH
> implementations, both because embedded systems using SSH are
> frequent targets and because these systems often only have minimal
...
> of client and server ID strings and adds a simple challenge/response
> to them, preventing the exchange of any SSH hand
> ords any actual SSH protocol messages, unless the pre-
> authentication succeeds. It does this by adding a random challenge
> in the Comment field of the server's SSH ID, with the client
...
> It is recommended that imp
> thentication attempts, throttling back responses if too many pre-
> authentication failures occur in a given time interval. To further
> confound attackers, servers may in addition opt to continue with an
...
/~\ The ASCII Mouse
\ / Ribbon Campaign
X Against HTML mouse%rodents-montreal.org@localhost
/ \ Email! 7D C8 61 52 5D E7 2D 39 4E F1 31 3E E8 B3 27 4B
Home |
Main Index |
Thread Index |
Old Index