Displaying 20 results from an estimated 2000 matches similar to: "[Bug 3211] New: A"
2020 Apr 26
5
[Bug 3155] New: openssh support hostkey encrypt
https://bugzilla.mindrot.org/show_bug.cgi?id=3155
Bug ID: 3155
Summary: openssh support hostkey encrypt
Product: Portable OpenSSH
Version: 8.2p1
Hardware: ARM64
OS: Linux
Status: NEW
Severity: security
Priority: P5
Component: ssh-keygen
Assignee: unassigned-bugs at mindrot.org
2020 Jun 17
7
[Bug 3182] New: openssh-8.2 make ClientAliveCountMax=0 disable the connection
https://bugzilla.mindrot.org/show_bug.cgi?id=3182
Bug ID: 3182
Summary: openssh-8.2 make ClientAliveCountMax=0 disable the
connection
Product: Portable OpenSSH
Version: 8.2p1
Hardware: ARM64
OS: Linux
Status: NEW
Severity: security
Priority: P5
Component: sshd
2020 Aug 08
4
[Bug 3200] New: Will future versions of openssh fix CVE-2020-15778?
https://bugzilla.mindrot.org/show_bug.cgi?id=3200
Bug ID: 3200
Summary: Will future versions of openssh fix CVE-2020-15778?
Product: Portable OpenSSH
Version: 8.3p1
Hardware: ARM64
OS: Linux
Status: NEW
Severity: security
Priority: P5
Component: scp
Assignee: unassigned-bugs
2005 Apr 04
1
Strange messages in dmesg after DDoS-attack.
Dear list,
A few days ago one of my machines were attacked by a DDoS-attack using UDP
on random ports.. When I later on analyzed the logs, I found this in my
dmesg:
xl0: initialization of the rx ring failed (55)
xl0: initialization of the rx ring failed (55)
xl0: initialization of the rx ring failed (55)
I tried to find out on google what it ment, but without any luck. What
does that mean and
2008 Mar 06
2
DDOS problem from Bangkok, Thailand
Dear Security team,
I'm Kamolpat Pornatiwiwat, Sys admin of DMaccess Co., Ltd. I'm got the
problem, My FreeBSD 6.0 got Dos attacked. What should I do? At the
present, I decide to stop apache and leave only mail feature on
functioning. Any guide/recommend/solution will be appreciated.
More detail about my server:
======================
FreeBSD 6.0
apache-1.3.34_4
php5-5.1.2_1
MySQL
2022 Oct 04
40
[Bug 3480] New: tracking bug for openssh-9.1
https://bugzilla.mindrot.org/show_bug.cgi?id=3480
Bug ID: 3480
Summary: tracking bug for openssh-9.1
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: Linux
Status: NEW
Keywords: meta
Severity: enhancement
Priority: P5
Component: Miscellaneous
Assignee:
2025 Apr 17
1
MaxStartups latches on, rejecting 100% until restart
On Thu, 17 Apr 2025, Damien Miller wrote:
> I haven't seen this behaviour and can't replicate it manually using
> OpenSSH 10.0. I think debugging this will require a log trace with
> LogLevel=debug3 if you can manage it.
Certainly can. Enabled in sshd_config and now a lot more information in
auth.log.
These occurances have been quite regular recently, so hopefully won't
2005 Feb 28
4
Recommendation for dialplan in case of DDoS atta cks?
I'm trying to formulate a strategy for our interconnected Asterisk IAX peers
to failover to the PSTN in the event of a DDoS. We currently use them like
this:
DID--->PRI--->Primary Asterisk--->IAX--->On-site Asterisk--->SIP
This works fine, and everyone is happy. One of my concerns, though, is if we
get DDoS'd - which happens probably once every couple of years. I'd
2013 Feb 09
5
FreeBSD DDoS protection
Hi,
I have a router running BGP and OSPF (bird) on FreeBSD.
Are there any best practises one can take in order to protect the network from DDoS attacks.
I know this isn't easy. But I would like to secure my network as much as possible.
Even if I'am not able to prevent or block a ddos I would like to get some info (snmp trap parhaps) regarding the attack.
Then I can contact my ISP or
2018 Jun 05
4
Help attack DDOS
Hi.
I have a problem with the icecast. When I activate the service I am having
an exesive consumption in the ip queries. It seems like a DDOS attack. How
can I mitigate this attack?
Thanks.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.xiph.org/pipermail/icecast/attachments/20180605/bd03e5eb/attachment.htm>
2019 Aug 11
6
[Bug 3055] New: Need some high-probability logging re MaxStartups
https://bugzilla.mindrot.org/show_bug.cgi?id=3055
Bug ID: 3055
Summary: Need some high-probability logging re MaxStartups
Product: Portable OpenSSH
Version: 8.0p1
Hardware: Other
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2018 Jun 05
2
Help attack DDOS
I ask because I only receive attacks when I activate icecast. I can not do
anything at the application level ?. i used ubuntu server 16.04. thanks.
2018-06-05 14:52 GMT-05:00 Alejandro Flores <alex at mordormx.net>:
> I think you should contact to your connectivity provider, hopefully they
> can provide you the Anti DDOS protection.
>
>
> On Tue, Jun 5, 2018 at 2:16 PM,
2002 Feb 12
3
Problem with ssh-keyscan: no hostkey alg
Hi,
I am using ssh-keyscan with a list of hosts, such as:
ssh-keyscan -t rsa -f hosts_for_keyscan
Some of the hosts in the list have dsa, but no rsa keys. For such
hosts, the command displays:
no hostkey alg
When this is the case for 2 hosts, this message appears twice AND
SSH-KEYSCAN STOPS QUERYING, which means that no keys at all are
returned for the following hosts.
Here is the part of the
2002 Jan 22
2
ssh-keyscan: xmalloc out of memory error
hi all,
I got "xmalloc: out of memory" when i used
ssh-keyscan to a remote host that is using
SSH protocol 2 and only protocol 2 (no fallback
to SSH protocol 1).
Looks to me more like ssh-keyscan doesn't talk
SSH protocol 2 to the server.
Please help.
Here is the exact error:
# /usr/local/bin/ssh-keyscan -v miad_1
# miad_1 SSH-2.0-OpenSSH_3.0.2p1
xmalloc: out of memory
2010 Nov 23
2
[Bug 1213] ssh-keyscan exits in mid-way
https://bugzilla.mindrot.org/show_bug.cgi?id=1213
--- Comment #3 from aab at purdue.edu 2010-11-23 12:00:50 EST ---
Created attachment 1961
--> https://bugzilla.mindrot.org/attachment.cgi?id=1961
One attempt at getting the rsa key from a remote server that was having
a number of problems.
--
Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email
------- You are receiving
2006 Jul 15
1
ssh-keyscan exits in mid-way
Hello All,
Im using OpenSSH 4.3p2 and tyring to scan a list of 40 machines in my
network with ssh-keyscan utility. I used the following command,
ssh-keyscan -t rsa -f hosts.txt
The man page says that this utility displays the host keys irrespective of
ssh or host is up/down and its working great. But in case if the scan
stops at 30th host due to some protocol problems, the utility exits and
2010 Jul 02
7
iptables/ blocking brute-force attacks, and so on...
I've just posted this to another list where we were talking about the same
old issues we've been plagues with recently - I'd already posted some
iptables rules, but added more to it for this...
This script probably isn't compatable with anything else, but I don't run
anything else. It's also designed to act on the incoming interface, not to
run in a router, but
2013 May 16
5
ddos attack causes high ksoftirqd cpu use
Hello List!
I got a small (50mbits or so) application layer ddos attack against a
few name servers (thousands of IPs sending lots of bogus A record
requests - weird) - one of the name servers was behind a shorewall
firewall. That firewall was running a 2.6.18-194.11.1.el5 kernel and
shorewall-4.4.11.1-1. I noticed that the shorewall host had ksoftirqd
using 100% of the CPU during the
2001 May 14
2
openssh-2.9p1
Hi,
1. I think you should apply the attached patch to openssh-2.9p1,
otherwise ssh-keyscan on linux boxes with glibc-2.1 will experience enormous
timeout delays.
2. Is there a program like ssh-keyscan for the Version2 (dsa and rsa) keys??
regards
Peter Breitenlohner <peb at mppmu.mpg.de>
-------------- next part --------------
diff -ur openssh-2.9p1.orig/ssh-keyscan.c
2023 Feb 27
1
Why does ssh-keyscan not use .ssh/config?
Hi ML members,
is there a reason, why ssh-keyscan does not use Host definitions from .ssh/config but does only relys on DNS host names? I have a quite long list of host names and a not that well maintained name server.