TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Some thoughts on OpenSSH 9.8's PerSourcePenalties feature

75 pointsby jandeboevrie9 months ago

11 comments

mdtancsa9 months ago
I suspect the distributed cracking will move to the same pattern as the SMTP/pop3 brute force guys did and use one IP per x+1 seconds where x=the ssh penalty window. We have seen this on our customer facing smtp server where we have hundreds of remote compromised IPs trying each one password per 30-60min. Still, I welcome this change as there are enough single prick attackers out there where this will help cut down on the size of the logs to process / digest.
评论 #41248427 未加载
评论 #41252763 未加载
mscdex9 months ago
For what it's worth if you have control over both client and server and don't want to limit access using a strict IP whitelist, an alternative solution that will keep your logs quieter and add additional protection is to use good old fashioned port knocking. knockd on Linux helps with automating this on the server side. Client side you can use anything (although knockd does include a dedicated client) to send your sequence of packets before actually connecting.
评论 #41251389 未加载
评论 #41252493 未加载
catkitcourt9 months ago
What’s the difference between fail2ban? Though I feel neither of those two works now.
评论 #41249743 未加载
评论 #41251560 未加载
评论 #41252201 未加载
bbayles9 months ago
How about a service that lets bruteforcers "in" after some number of failed attempts, but what they get is just a fake command prompt that accepts all of their commands? I'm sure hackers would eventually adapt, but it would annoy them for a while.
评论 #41251335 未加载
评论 #41250321 未加载
djbusby9 months ago
This thread has some mentions of memory-safe issues. Has anyone tried a Go or Rust sshd in their production?<p>I&#x27;ve had some dreams of a &quot;tighter&quot; sshd for my universe and have toyed (unsuccessfully) with a Go one.<p>Anyone want to share their experience?
kkfx9 months ago
Hem... There is PerSourcePenaltyExemptList to whitelist specific hosts so while I agree it might create a bit more complexity (not much different than handling fail2ban and co) it&#x27;s not &quot;blocking&quot; like described.
jijji9 months ago
I usually just IP whitelist inbound sshd connections and then drop all other packets
jms7039 months ago
If you must expose SSH to the internet, this can be a helpful feature.
PreInternet019 months ago
PerSourcePenalties-like abuse mitigations are not very subtle, but often <i>very</i> effective.<p>My own experience with this is not as much with SSH as with SMTP. If your particular IP emits a single non-deliverable message every 30 minutes or so, that&#x27;s fine.<p>But: more than a handful of SPF failures for the same sender&#x2F;recipient combo within 10 minutes or so? Yeah, you&#x27;re now on the general-deny-list. And persisting even then? Automagically tar-pitted on the firewall, and have fun...
评论 #41248059 未加载
mmsc9 months ago
<i>the future</i> is bleak: Attackers can just rent a &#x2F;48 ipv6 block for a few dollars and have a billion IPs at their disposal.
评论 #41249736 未加载
评论 #41251051 未加载
评论 #41249778 未加载
评论 #41250747 未加载
评论 #41249336 未加载
WhatIsDukkha9 months ago
I wish the openssh folks would implement a UDP based &quot;whole auth key or no talk at all&quot; protocol.<p>ie Single Packet Authorization<p>Wrapping your ssh with wireguard (because wireguard doesn&#x27;t respond without a full key) doesn&#x27;t feel too good.
评论 #41248963 未加载
评论 #41248543 未加载
评论 #41249813 未加载
评论 #41251367 未加载
评论 #41248955 未加载
评论 #41249405 未加载
评论 #41251795 未加载