The patch I proposed just invokes an external program on every failed
login attempt detected. I does not implement any policy. And if the
offending host is blocked, by modifying firewall rules or similar, there
could be no hammering.
I think it depends on your use case. That said, I understand why some
people might not want to use yet another process when all they are
trying to do is ban people spamming your sshd process. No promises but
we can look into it. I don't think the actually banning part would be
all that hard. It's everything that goes along with it in terms of
managing things and making sure it would be performant enough in high
volume scenarios.
a) reduce the code that the openssh dev team needs to maintain as it
doesn't really touch ssh at all
b) reduces code complexity, path breaking, etc.
c) is self contained and optional for those that really want it.
- Support for the final PQC candidates NIST choose
- Having ssh-key based logins consult PAM so that external modules could
make additional judgement calls or update login statistics.
> So what if this was done as a PAM module? That would :
Only work on GNU/Linux, GNU/Hurd, Solaris and IIRC FreeBSD,
but nowhere else as other OSes don’t use PAM (not even all
GNU/Linux distros do).
bye,
//mirabilos
--
Infrastrukturexperte • Qvest Digital AG
Am Dickobskreuz 10, D-53121 Bonn • https://www.qvest-digital.com/
Telephon +49 228 54881-393 • Fax: +49 228 54881-235
HRB AG Bonn 18196 • USt-ID (VAT): DE274355441
Vorstand: Dr. Stefan Barth, Kai Ebenrett, Boris Esser, Alexander Steeg
Vorsitzender Aufsichtsrat: Peter Nöthen
My €0,02:
- https://marc.info/?t=169442622800001&r=1&w=2
- IIRC the ControlMaster stuff doesn't remember for _which_ client
a port forwarding was done, so it can't remove it when this client
quits.
That might arguably be more of a bugfix, though.
- Also, when having a session open via ControlMaster, ~# won't list
connections from _other_ clients, neither port forwardings.
Having more menu options in ~? to see the forwardings, stop them,
and wasn't there an option to _add_ forwardings to established
connections?
--
Dmitry Belyavskiy
On Wed, 2023-10-18 at 13:13 -0400, Chris Rapier wrote:
> Do any of you have a wish list of things you'd like to see in ssh?
Meanwhile, a lot of parts have to work together for SSH to work as
desired: ssh-client, ssh-agent, gpg-agent, scdaemon, sshd, pam, ....
As an admin who works with SSH all day in a company whose employees do
everything via SSH, I would like to see better debug options in the
entire stack with the long-term goal of being able to evaluate them
automatically with some data format (json, yaml). Sshd and ssh-agent
cannot be switched to 'debug' mode afterwards without shooting yourself
in the foot.
It would be nice if there were better ways to find out why something
didn't work. For example, we've had corporate firewalls that discarded
certain handshake packets and it was really hard to get the idea of
what was going wrong in the first place.
ESC~#
Börn Lässig
Line rate ssh. Like if I have a 10G pipe I should be able to push 10G through without spending significant effort tweaking it for this specific transfer. I know this is partially wishful thinking but I’d like it to be easier.
This might be QUIC or some other UDP layer, or it might be something else entirely.
ssh is my go to tool for shifting almost anything from one place to another, except where I’m limited by single tcp streams.
A+
Dave