See https://en.wikipedia.org/wiki/Denial-of-service_attack - that's the
counterargument.
But whichever way, you don't have the right audience here. Tell upstream
:)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in U
@Robie Basak (racb):
OK, though having a good default values impacts greatly on the security
of systems world-wide.
Normal users just install a software but don't configure.
This encourages hackers to attempt to hack users world-wide.
If hackers knew that a good default configurations are present
This is a feature request that may be addressed by upstream, but
certainly won't be addressed by Ubuntu in a delta. Therefore I'm marking
the "openssh (Ubuntu)" task as Won't Fix for now, because we have no
plans to fix it in Ubuntu. If you'd still like this feature in the
openssh package, then you
The ufw frontend to iptables has an easy 'limit' command that automates
much of the tedium of installing firewall rulesets by hand. This will
address specific IPs doing brute-force login attempts but distributed
brute-force login attempts won't be affected.
There's also a pam_faildelay(8) module t
Hi,
those two cover pretty much what you want to achieve I think:
https://ubuntuforums.org/showthread.php?t=1409993
https://www.rackaid.com/blog/how-to-block-ssh-brute-force-attacks/
** Changed in: openssh (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because yo
5 matches
Mail list logo