| Summary: | Too many hostbased authentication attempts | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | Iain Morgan <imorgan> | ||||||||
| Component: | ssh | Assignee: | Damien Miller <djm> | ||||||||
| Status: | CLOSED FIXED | ||||||||||
| Severity: | enhancement | CC: | djm | ||||||||
| Priority: | P5 | ||||||||||
| Version: | 6.5p1 | ||||||||||
| Hardware: | All | ||||||||||
| OS: | All | ||||||||||
| Bug Depends on: | |||||||||||
| Bug Blocks: | 2266 | ||||||||||
| Attachments: |
|
||||||||||
|
Description
Iain Morgan
2014-03-15 10:31:48 AEDT
Would it be possible to have sshd disable hostbased authcation if auth_rhosts2() fails? That would catch the majority of cases where repeated hostbased auth attempts with different keys is pointless. In other words, if auth_rhosts2() fails, it will fail for all key types, so there is really no point in letting the client make further attempts using that authentication method. Created attachment 2529 [details]
Add HostbasedKeyTypes to ssh(1)
Add support for a HostbasedKeyTypes client option, inspired by and
largely based upon HostbasedAcceptedKeyTypes. This allows the
administrator (or user) to select a subset of the supported key types
for use with hostbased authentication.
Created attachment 2532 [details]
Add HostbasedKeyTypes to scp.1 and sftp.1
Created attachment 2539 [details]
make HostbasedKeyTypes control order as well as select types sent
Most of the other options to control protocol methods specify the ordering they are offered or attempted as well as selecting which are available.
I've modified your patch to control the order too. It's a little more complex, but works OK against my test server. It also updates userauth_hostbased and ssh_keysign to the new post-refactor API.
(patch is against OpenBSD -current)
patch applied - will be in OpenSSH-6.8. Thanks! openssh-6.8 is released |