Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 21 Jul 2015 06:40:52 -0700 (PDT)
From:      Roger Marquis <marquis@roble.com>
To:        "freebsd-security@freebsd.org" <freebsd-security@freebsd.org>
Subject:   Re: OpenSSH max auth tries issue
In-Reply-To: <201507190220.UAA14096@mail.lariat.net>
References:  <55A95526.3070509@sentex.net> <201507190220.UAA14096@mail.lariat.net>

| previous in thread | raw e-mail | index | archive | help

Brett Glass wrote:
> Because a potential intruder can establish multiple or "tag-teamed" TCP 
> sessions (possibly from different IPs) to the SSH server, a per-session limit 
> is barely useful and will not slow a determined attacker. A global limit 
> might, but would enable DoS attacks.

If you run sshd under inetd the "-C" flag will enforce rate limits on a
per IP basis.  Still vulnerable to resource exhaustion under a DDOS
perhaps but it would have to be a serious effort.

Considering the potential interactions between inetd.conf, login.conf,
sshd_config and perhaps fail2ban or portsentry it's surprising there
isn't more documentation on this important topic.

Roger


>> 
>> https://kingcope.wordpress.com/2015/07/16/openssh-keyboard-interactive-authentication-brute-force-vulnerability-maxauthtries-bypass/
>> 
>> "OpenSSH has a default value of six authentication tries before it will
>> close the connection (the ssh client allows only three password entries
>> per default).
>> 
>> With this vulnerability an attacker is able to request as many password
>> prompts limited by the ???login graced time??? setting, that is set to two
>> minutes by default."
>>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?>