[Bug 1049] Variable delay in password logins to fight dictionary attacks
bugzilla-daemon at mindrot.org
bugzilla-daemon at mindrot.org
Tue May 31 21:04:54 EST 2005
http://bugzilla.mindrot.org/show_bug.cgi?id=1049
Summary: Variable delay in password logins to fight dictionary
attacks
Product: Portable OpenSSH
Version: 3.8.1p1
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: enhancement
Priority: P2
Component: sshd
AssignedTo: bitbucket at mindrot.org
ReportedBy: heikki at indexdata.dk
I have seen many dictionary attacks on my ssh servers. I was thinking of a simple way to slow
them down: Add a small delay to the login. Start with a half second, and double every time a
password-based (or other) login fails from the same IP address, up to some limit.
This requires keeping a small array in memory, with each IP address that has recently failed
to log in, delay time, and a time stamp when a login from them will be allowed again.
In a similar way, it should be possible to keep a time-out for each username, again doubling it.
At a login, take the greater of the two delays.
Both tables can be limited to (say) 10000 entries, and if they flow over, discard oldest entries.
Actually, this could also be used for logins that do not try passwords, in case someone tries to
brute-force something else...
Possibly this is a well-known theory, and there is a well-known reason not to use it. If so, I'd
like to hear about it.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
More information about the openssh-bugs
mailing list