Subject: Re: Interesting security discovery.
To: None <tech-security@NetBSD.org>
From: Alex Pelts <alexp@broadcom.com>
List: tech-security
Date: 09/13/2006 16:52:45
That is always a possibility even without adding a delay. There is a
setting in sshd_conf that limits number of unauthenticated connections.
Using this setting will also possible to create denial of service condition.
Creating a delay will serve as a possible deterrent of automated
password guessing. As I mentioned it is not good on busy interactive shh
servers, but on game/http/ftp servers where numbers of interactive ssh
logins is low, this could be used.
Are there any other problems with this besides denial of service?
Regards,
Alex
Daniel Carosone wrote:
> On Wed, Sep 13, 2006 at 02:38:56PM -0700, Alex Pelts wrote:
>> I was trying to improve on my banhosts utility and while searching for
>> possible features I found this page
>> http://tdot.blog-city.com/securing_ssh_with_denyhosts.htm
>>
>> This solution maybe not appropriate for hosts with high number of ssh
>> users but for http/ftp/game servers it will make password guessing very
>> time consuming.
>
> You're opening yourself to denial of service, if someone opens many
> ssh logins to you in parallel.
>
> --
> Dan.