Comments on: Stop ssh brute force attack using SuSEfirewall https://lizards.opensuse.org/2009/06/22/stop-ssh-brute-force-attack-using-susefirewall/ Blogs and Ramblings of the openSUSE Members Fri, 06 Mar 2020 17:50:09 +0000 hourly 1 https://wordpress.org/?v=4.7.5 By: rgb https://lizards.opensuse.org/2009/06/22/stop-ssh-brute-force-attack-using-susefirewall/#comment-1053 Thu, 02 Jul 2009 15:18:05 +0000 http://lizards.opensuse.org/2009/06/22/stop-ssh-brute-force-attack-using-susefirewall/#comment-1053 Not three attempts. Three connections, in which multiple authentication attempts (see MaxAuthTries in sshd_config) can be made.

NB: You do not want to set MaxAuthTries below 2, or otherwise the login procedure fails if it first tries a pubkey and then a password in case you do not have a matching key AND if you have not manually specified the auth method via ssh(1).

]]>
By: Jeff Shantz https://lizards.opensuse.org/2009/06/22/stop-ssh-brute-force-attack-using-susefirewall/#comment-1042 Wed, 24 Jun 2009 04:41:26 +0000 http://lizards.opensuse.org/2009/06/22/stop-ssh-brute-force-attack-using-susefirewall/#comment-1042 Very nice, thanks for that. I always eschewed SuSEfirewall2 thinking it was limited compared to using iptables directly. I’m starting to think differently as I research it for the YaST Education module.

]]>