restrict access
Sebastian Gottschall
s.gottschall at dd-wrt.com
Thu May 20 23:03:27 AWST 2021
what about a feature like blocking a client for N minutes if more than N
times of failed logins. its relativily easy to implement and lows down
brute force attacks
Am 20.05.2021 um 16:44 schrieb Matt Johnston:
> On Thu, May 20, 2021 at 02:29:20PM +0000, Walter Harms wrote:
>> Thx for the fast response,
>> for the background: little system, far-far-away land, but some script-kiddie is filling the log ...
>> so no iptables or other fancy stuff. Seems i have to change that, somehow.
>>
>> @matt:
>> in case i get something working ...
>> i am thinking about fnmatch and inet_ntoa would that be acceptable ?
> I'm not really sure it's the job of Dropbear to be doing
> that filtering. Though I wonder if it might make sense to
> optionally not bother logging failed SSH auth attempts,
> given how many there are...
>
> Cheers,
> Matt
>
More information about the Dropbear
mailing list