Displaying 20 results from an estimated 20000 matches similar to: "request: add IP address to a log message to allow blocking"
2016 Mar 29
3
request: add IP address to a log message to allow blocking
On Tue 2016-03-29 18:10:00 -0400, Damien Miller wrote:
> On Tue, 29 Mar 2016, IMAP List Administration wrote:
>> If you haven't already, an you please add the IP address to this message, and
>> any similar messages? I'm using version 6.7p1.
>
> I actually added that recently. It will be in openssh-7.3, due in a
> couple of months.
Will it be configurable? There
2014 Dec 13
5
[Bug 2327] New: sshd to log one unique string or prefix after connection failure, no matter why.
https://bugzilla.mindrot.org/show_bug.cgi?id=2327
Bug ID: 2327
Summary: sshd to log one unique string or prefix after
connection failure, no matter why.
Product: Portable OpenSSH
Version: 6.7p1
Hardware: All
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
2015 Sep 10
3
[Bug 2461] New: Source IP missing in log when no suitable key exchange method found
https://bugzilla.mindrot.org/show_bug.cgi?id=2461
Bug ID: 2461
Summary: Source IP missing in log when no suitable key exchange
method found
Product: Portable OpenSSH
Version: 6.0p1
Hardware: Other
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: sshd
2014 Apr 25
1
public key authentication -- log invalid keys
Hi guys,
i was wondering if someone could point me in the right direction please.
if someone connects using public keys, but uses the wrong keys to
connect, openssh logs this kind of thing:
Apr 21 23:50:04 [sshd] SSH: Server;Ltype: Version;Remote:
122.169.248.92-49232;Protocol: 2.0;Client: libssh-0.2
Apr 21 23:50:05 [sshd] SSH: Server;Ltype: Kex;Remote:
122.169.248.92-49232;Enc: aes128-cbc;MAC:
2020 Jul 07
3
libssh2 is hanging during a file transfert
I'm trying to send data to a server with openssh 7.9p1, but it's hanging
somewhere.
the client stop at the line :
Jul 7 11:52:16 TOTO sshd[19553]: debug3: channel 0: will not send data
after close
and after 5 minutes the client closes the connection, why ?
This is the trace of the server openssh : ( DEBUG3 level)
Jul 7 11:52:15 TOTO sshd[31175]: debug3: fd 6 is not O_NONBLOCK
Jul
2014 Dec 23
3
chaining AUTH methods -- adding GoogleAuthenticator 2nd Factor to pubkey auth? can't get the GA prompt :-/
On Sun, Dec 21, 2014 at 5:25 PM, Damien Miller <djm at mindrot.org> wrote:
> On Fri, 19 Dec 2014, Dmt Ops wrote:
>
> > I added an EXPLICIT
> >
> > AuthenticationMethods publickey,keyboard-interactive
> > + UsePam yes
> >
> > to sshd_config. Now, at connect attempt I get
> >
> > Password:
> > Verification code:
> >
2017 Jul 21
15
[Bug 2746] New: RFE: Allow to disable SHA1 signatures for RSA
https://bugzilla.mindrot.org/show_bug.cgi?id=2746
Bug ID: 2746
Summary: RFE: Allow to disable SHA1 signatures for RSA
Product: Portable OpenSSH
Version: 7.5p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
Assignee: unassigned-bugs at
2014 Mar 27
1
AIX SFTP with chroot : conection closed without error message
Hello,
I'm trying to setup a chroot for one user on my AIX 5.2 system
I have tried with openssh 5.0 (don't know where it comes from) and as it
didn't work, I have downloaded and compiled the current version (6.6p1)
When I connect, password is checked, chroot is done, sftp subsystem is
accepted, but I get disconnected without any error
Below is all can say about my config (after
2014 Jan 02
1
New Log Messages?
In recent months I started noticing a new type of log message. Here
are some examples. One of each but my logs show many runs of these
types of messages. Along with others but these are the majority
type. Imagine lines like these repeated many times in the syslog.
Dec 7 15:49:42 havoc sshd[7575]: Received disconnect from 114.80.246.178: 11: Normal Shutdown, Thank you for playing [preauth]
2014 May 25
2
Samba 4 / Kerberos / ssh
I try to get Samba 4 with ssh running.
I found in the Script from Matthieu Patou tot he sysvol sync the follwing intresting line.
---
kinit -k -t /etc/krb5.keytab `hostname -s | tr "[:lower:]" "[:upper:]"`\$
rsync -X -u -a $dc_account_name\$@${dc}.${domain}:$SYSVOL $STAGING
---
when i understand correct he uses the domain controller service principle to connect to the
2014 Feb 04
8
[Bug 2199] New: "Too many authentication failures for root" does not log IP
https://bugzilla.mindrot.org/show_bug.cgi?id=2199
Bug ID: 2199
Summary: "Too many authentication failures for root" does not
log IP
Product: Portable OpenSSH
Version: 6.4p1
Hardware: All
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component:
2015 May 30
8
Call for testing: OpenSSH 6.9
Debian GNU/Linux 8.0 (jessie)
OpenSSL 1.0.1k
gcc (Debian 4.9.2-10) 4.9.2
"make tests" fails here:
/usr/src/INET/openssh/ssh-keygen -lf
/usr/src/INET/openssh/regress//t12.out.pub | grep test-comment-1234
>/dev/null
run test connect.sh ...
ssh connect with protocol 1 failed
ssh connect with protocol 2 failed
failed simple connect
Makefile:192: recipe for target 't-exec' failed
2013 Jan 02
8
Auto ban IP addresses
Greetings all,
I have been seeing a lot of
[Jan 2 16:36:31] NOTICE[7519]: chan_sip.c:23149 handle_request_invite:
Sending fake auth rejection for device
100<sip:100 at 108.161.145.18>;tag=2e921697
in my logs lately. Is there a way to automatically ban IP address from
attackers within asterisk ?
Thank you
2018 Nov 22
2
Debian Stretch 9.6: openssh-server and old dropbear client don't work togheter
Hi, I have compatibility issues with the latest version of
openssh-server and an old dropbear client, the dopbear client stops at
preauth
ov 22 14:34:03 myhostname sshd[3905]: debug1: Client protocol version
2.0; client software version dropbear_0.46
Nov 22 14:34:03 myhostname sshd[3905]: debug1: no match: dropbear_0.46
Nov 22 14:34:03 myhostname sshd[3905]: debug1: Local version string
2019 Jan 05
2
IMAP preauth and stats-writer
I use IMAP preauth; I connect with Alpine over SSH which is very useful.
The last few upgrades this has become more difficult to to. Last time
(moving 2.2 -> 2.3, I think) I had to put in a workaround:
stats_writer_socket_path =
It prevented /usr/local/libexec/dovecot/imap attempting to
connect to a central stats service.
As of an upgrade today (2.3.2.1_1 -> 2.3.4_3 on FreeBSD) it
2018 Nov 23
2
Debian Stretch 9.6: openssh-server and old dropbear client don't work togheter
Il giorno gio 22 nov 2018 alle ore 21:24 Stuart Henderson
<stu at spacehopper.org> ha scritto:
>
> On 2018/11/22 19:55, owl700 at gmail.com wrote:
> > Hi, I have compatibility issues with the latest version of
> > openssh-server and an old dropbear client, the dopbear client stops at
> > preauth
> >
> > ov 22 14:34:03 myhostname sshd[3905]: debug1: Client
2006 Nov 16
0
Re: IPTables Blocking Brute Forcers
Another good one is
http://denyhosts.sourceforge.net/
It runs as a daemon, and can either ban IP's addresses all together, or
just ban certain services.
-----Original Message-----
From: centos-bounces at centos.org [mailto:centos-bounces at centos.org] On
Behalf Of Brian Marshall
Sent: Thursday, November 16, 2006 9:33 AM
To: CentOS mailing list
Subject: Re: [CentOS] Re: IPTables
2020 Jan 09
3
Blocking attacks from a range of IP addresses
On 1/9/20 2:08 AM, Pete Biggs wrote:
>> Has anyone created a fail2ban filter for this type of attack? As of
>> right now, I have manually banned a range of IP addresses but would
>> like to automate it for the future.
>>
> As far as I can see fail2ban only deals with hosts and not networks - I
> suspect the issue is what is a "network": It may be obvious to
2024 Jul 28
1
SSH time increased significantly after upgrade to OpenSSH 9.6p1
Team,
We upgraded sshd in our product from OpenSSH 8.6 to OpenSSH 9,.6.
After the upgrade, clients are seeing significant increase in time to
do ssh to the listener. Normally, a single ssh does not matter much
but some of our workflows involve about 3000 to 4000 ssh connect and
close and this is hitting us hard,
I enabled logging on the server side. I see the most of the increase
is here in
2019 Jan 06
2
IMAP preauth and stats-writer
On 06/01/2019 02:26, John Fawcett wrote:
> On 05/01/2019 15:49, Mark Hills wrote:
>> I use IMAP preauth; I connect with Alpine over SSH which is very useful.
>>
>> The last few upgrades this has become more difficult to to. Last time
>> (moving 2.2 -> 2.3, I think) I had to put in a workaround:
>>
>> stats_writer_socket_path =
>>
>> It