[Info-vax] SSH on VAX - performance impact of break in attempts

Bob Koehler koehler at eisner.nospam.encompasserve.org
Fri Aug 27 10:47:42 EDT 2010


In article <30bb3a36-2c46-4041-bf98-2f2d0329ffa7 at x21g2000yqa.googlegroups.com>, urbancamo <mark at wickensonline.co.uk> writes:
> 
> I have attempted a number of strategies to reduce this impact:
> 
> 1. I have defined an AllowUsers list so only named users are allowed.
> 2. I have set AuthInteractiveFailureTimeout to 30 so that there is a
> 30 second delay between login attempts from the same host/session.
> 3. I have set RequiredAuthentications to publickey,password so that
> both a password and a valid public key are required.

   I didn't see what stack you're using, but I think all of them
   allow you to limit the number of concurrent connections.  If you can
   set it to just above the number of people who normally log in, then
   many of the attacks will bounce off without using up so much CPU.

   Of course, during the attack, real users would hit the same limit.




More information about the Info-vax mailing list