[prev in list] [next in list] [prev in thread] [next in thread]
List: openssh-bugs
Subject: [Bug 2633] New: Provide hook invoked for login failures
From: bugzilla-daemon () bugzilla ! mindrot ! org
Date: 2016-10-26 18:03:41
Message-ID: bug-2633-705 () https ! bugzilla ! mindrot ! org/
[Download RAW message or body]
https://bugzilla.mindrot.org/show_bug.cgi?id=2633
Bug ID: 2633
Summary: Provide hook invoked for login failures
Product: Portable OpenSSH
Version: 7.3p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee: unassigned-bugs@mindrot.org
Reporter: josh@joshtriplett.org
Many different scripts exist to parse the log output of sshd and
attempt to block sources of excessive failed login attempts. Most such
scripts involve fragile, easily-misled text parsing.
Please consider adding a standard hook, configurable in sshd_config,
invoked by sshd when a login fails. That hook should receive the
source IP address for the connection, and the login type(s) attempted
and failed (not those not attempted), so that it can decide (for
instance) to have different thresholds for password attempts/failures
and key-based failures.
--
You are receiving this mail because:
You are watching the assignee of the bug.
_______________________________________________
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic