lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CALPTtNXoCq5azD8ArePA1ZL-=vki0gEECeHJFRHcVgatv22G6A@mail.gmail.com> Date: Sat, 18 Jul 2015 14:23:40 -0700 From: Reed Loden <reed@...dloden.com> To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org> Subject: Re: [FD] OpenSSH keyboard-interactive authentication brute force vulnerability (MaxAuthTries bypass) On Friday, July 17, 2015, <devel@...soft.ltd.uk> wrote: > Do you know if this is still affected if you have fail2ban in place. > Fail2ban uses the auth logs to monitor failed password attempts. I > assume that the auth log is still updated even if x number of attempts > is allowed. Thanks http://www.reddit.com/r/netsec/comments/3dnzcq/openssh_keyboardinteractive_authentication_brute/ct726ni goes over this question pretty well, so as not to rehash everything. ~reed _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists