User: Password:
|
|
Subscribe / Log in / New account

Preventing brute force ssh attacks

Preventing brute force ssh attacks

Posted Oct 25, 2007 15:40 UTC (Thu) by apollock (subscriber, #14629)
In reply to: Preventing brute force ssh attacks by Tet
Parent article: Preventing brute force ssh attacks

With OpenSSH, I think you could address this issue by configuring SSH to reuse existing
connections, rather than spawning new ones. You'd even get a performance improvement. See the
ControlMaster and ControlPath configuration directives in ssh_config(5)


(Log in to post comments)

Preventing brute force ssh attacks

Posted Oct 30, 2007 16:34 UTC (Tue) by droundy (subscriber, #4559) [Link]

This approach sort of works.  But there is a bug in ssh that causes it to occasionally hang
when working with a control master.  So it's not yet a general solution.  :(

(And no, I've no idea what triggers this bug, it appears to be platform-dependent, showing up
more often on MacOS X.  And yes, it's been reported to the OpenSSH developers.)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds