|
From: Kevin Z. <kev...@gm...> - 2016-04-19 20:38:29
|
On 04/18/2016 15:33, Henri Shustak wrote: > This was not the case at least when I attempted to repeatedly connect > with incorrect keys over 15 times, the connection was still open. > This is why I sent the initial message. It seems like it would be a > good idea to block this kind of pre-auth disconnect. > > I did find some instructions (in previous message). However, I was > wondering why this was not part of the standard configuration or if > there was a simple flag which needed to be set to enable blocking of > these pre-auth attacks? What version of SSHGuard are you using? What pre-auth disconnect message showed up in the logs? -- Kevin Zheng kev...@gm... | ke...@be... | PGP: 0xC22E1090 |