Re: SSH key exchange fails 30-70% of the time on Netgear X4S R7800

2020-03-28 Thread Sebastian Gottschall
-- *From:* Horshack ‪‬ *Sent:* Tuesday, March 24, 2020 9:25 PM *To:* Sebastian Gottschall ; dropbear@ucc.asn.au *Subject:* Re: SSH key exchange fails 30-70% of the time on Netgear X4S R7800 I excluded context switches as a possible culprit by looping until a corruption happened for whic

Re: SSH key exchange fails 30-70% of the time on Netgear X4S R7800

2020-03-24 Thread Sebastian Gottschall
if the corruption is caused by a context switch the problem can be caused by the kernel. try the following and disable "CONFIG_KERNEL_MODE_NEON" in the kernel config. this will disable some kernel crypto assembly code Am 24.03.2020 um 16:11 schrieb Matt Johnston: Good work narrowing down a

Re: SSH key exchange fails 30-70% of the time on Netgear X4S R7800

2020-03-24 Thread Sebastian Gottschall
@ucc.asn.au on behalf of Sebastian Gottschall *Sent:* Tuesday, March 24, 2020 9:13 PM *To:* dropbear@ucc.asn.au *Subject:* Re: SSH key exchange fails 30-70% of the time on Netgear X4S R7800 if the corruption is caused by a context switch the problem can be caused by the kernel. try the following

Re: restrict access

2021-05-20 Thread Sebastian Gottschall
what about a feature like blocking a client for N minutes if more than N times of failed logins. its relativily easy to implement and lows down brute force attacks Am 20.05.2021 um 16:44 schrieb Matt Johnston: On Thu, May 20, 2021 at 02:29:20PM +, Walter Harms wrote: Thx for the fast

Re: restrict access

2021-05-20 Thread Sebastian Gottschall
isnt that a job for netfilter? Am 20.05.2021 um 15:23 schrieb Walter Harms: Hello List, actually i expected this would be a FAQ but i can not find an answer: How can i restrict the hosts that are allowed to access the dropbear server ? re, wh

Re: restrict access

2021-05-20 Thread Sebastian Gottschall
: in case i get something working ... i am thinking about fnmatch and inet_ntoa would that be acceptable ? re, wh Von: Dropbear im Auftrag von Sebastian Gottschall Gesendet: Donnerstag, 20. Mai 2021 15:53 An: dropbear@ucc.asn.au Betreff: Re: restrict access

Re: restrict access

2021-05-22 Thread Sebastian Gottschall
n Thu, May 20, 2021 at 5:05 PM Sebastian Gottschall wrote: what about a feature like blocking a client for N minutes if more than N times of failed logins. its relativily easy to implement and lows down brute force attacks Am 20.05.2021 um 16:44 schrieb Matt Johnston: On Thu, May 20, 2021 at 02: