Bug 1877 - Protection against brute force attacks
Summary: Protection against brute force attacks
Status: CLOSED WONTFIX
Alias: None
Product: Portable OpenSSH
Classification: Unclassified
Component: sshd (show other bugs)
Version: 5.8p1
Hardware: All Linux
: P2 normal
Assignee: Assigned to nobody
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2011-03-08 12:04 AEDT by sworddragon2
Modified: 2011-09-06 15:33 AEST (History)
2 users (show)

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description sworddragon2 2011-03-08 12:04:21 AEDT
I see every few days in the process list that somebody is trying to connect to my server every second. I have a good password and such a brute force attack is nearly impossible but I want some more security.

For example an option that blocks an ip address for a specific time after a few amount of fails. Another example is that we can allow ssh connections only every few seconds from a client. All these values should be configurable.
Comment 1 Damien Miller 2011-04-12 15:40:49 AEST
Good external solutions exist. The best is to enforce password strength.
Comment 2 LOGIN 2011-07-04 00:36:32 AEST
One more great solution against Brute Force attack is LoginWall.

you could download free anti brute force solution from their website www.loginwall.com
Comment 3 Damien Miller 2011-09-06 15:33:01 AEST
close resolved bugs now that openssh-5.9 has been released