| Summary: | auto disable/block of ip address | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | Jeremiah Jahn <jeremiah> |
| Component: | sshd | Assignee: | OpenSSH Bugzilla mailing list <openssh-bugs> |
| Status: | CLOSED WONTFIX | ||
| Severity: | enhancement | ||
| Priority: | P2 | ||
| Version: | 3.9p1 | ||
| Hardware: | All | ||
| OS: | Linux | ||
|
Description
Jeremiah Jahn
2004-12-21 01:38:26 AEDT
We won't implement reflexive blocking, it can be easily implemented by scanning logs (i.e not in ssh) and there are too many ways it can be turned into a denial-of-service. If you really want to do this, there are scripts that will parse logfiles and add addresses found to a firewall rule. I'll also add that if you really want this and your sshd is built with PAM then then you could implement this policy in a PAM module (eg hack pam_tally to take notice of PAM_RHOST). Incidentally, if folks running PAM really want to do this, there's now a pam_abl module that does it: http://www.hexten.net/sw/pam_abl/ Change all RESOLVED bug to CLOSED with the exception of the ones fixed post-4.4. |