| Summary: | Variable delay in password logins to fight dictionary attacks | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | Heikki Levanto <heikki> |
| Component: | sshd | Assignee: | Assigned to nobody <unassigned-bugs> |
| Status: | CLOSED WONTFIX | ||
| Severity: | enhancement | ||
| Priority: | P2 | ||
| Version: | 3.8.1p1 | ||
| Hardware: | ix86 | ||
| OS: | Linux | ||
|
Description
Heikki Levanto
2005-05-31 21:04:54 AEST
This doesn't fit well with ssh's process model and would add quite a bit of complexity for pretty marginal gain. On the other hand, it could easily be implemented as a small program that watches logs and sets up firewall rules. Please see the extended discussion on this topic on the openssh-unix-dev@mindrot.org mailing list. BTW it can also be implemented in the underlying auth systems that sshd uses, eg LinuxPAM has pam_fail_delay. See: http://www.kernel.org/pub/linux/libs/pam/Linux-PAM-html/pam_appl-3.html#the-failure-delay-function and for a way to set this in the PAM config files: http://www.zip.com.au/~dtucker/patches/pam_faildelay.c Change all RESOLVED bug to CLOSED with the exception of the ones fixed post-4.4. |