close the connection.
Hans
On Thu, May 20, 2021 at 5:05 PM Sebastian Gottschall
wrote:
what about a feature like blocking a client for N minutes if more than N
times of failed logins. its relativily easy to implement and lows down
brute force attacks
Am 20.05.2021 um 16:44 schrieb Matt Johnston:
what about a feature like blocking a client for N minutes if more than N
times of failed logins. its relativily easy to implement and lows down
brute force attacks
Am 20.05.2021 um 16:44 schrieb Matt Johnston:
On Thu, May 20, 2021 at 02:29:20PM +, Walter Harms wrote:
Thx for the fast resp
case i get something working ...
i am thinking about fnmatch and inet_ntoa would that be acceptable ?
re,
wh
Von: Dropbear im Auftrag von Sebastian Gottschall
Gesendet: Donnerstag, 20. Mai 2021 15:53
An: dropbear@ucc.asn.au
Betreff: Re: restrict access
isnt that a job for netfilter?
Am 20.05.2021 um 15:23 schrieb Walter Harms:
Hello List,
actually i expected this would be a FAQ but i can not find an answer:
How can i restrict the hosts that are allowed to access the
dropbear server ?
re,
wh
*From:* Horshack
*Sent:* Tuesday, March 24, 2020 9:25 PM
*To:* Sebastian Gottschall ;
dropbear@ucc.asn.au
*Subject:* Re: SSH key exchange fails 30-70% of the time on Netgear
X4S R7800
I excluded context switches as a possible culprit by looping until a
corruption happene
@ucc.asn.au
on behalf of Sebastian
Gottschall
*Sent:* Tuesday, March 24, 2020 9:13 PM
*To:* dropbear@ucc.asn.au
*Subject:* Re: SSH key exchange fails 30-70% of the time on Netgear
X4S R7800
if the corruption is caused by a context switch the problem can be
caused by the kernel.
try the following
if the corruption is caused by a context switch the problem can be
caused by the kernel.
try the following and disable "CONFIG_KERNEL_MODE_NEON"
in the kernel config. this will disable some kernel crypto assembly code
Am 24.03.2020 um 16:11 schrieb Matt Johnston:
Good work narrowing down a test