[Bug 3771] Will future versions of openssh provide DDoS attack defense for the DH algorithm?:CVE-2024-41996
    bugzilla-daemon at mindrot.org 
    bugzilla-daemon at mindrot.org
       
    Thu Jan  2 14:07:07 AEDT 2025
    
    
  
https://bugzilla.mindrot.org/show_bug.cgi?id=3771
Darren Tucker <dtucker at dtucker.net> changed:
           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |dtucker at dtucker.net
--- Comment #1 from Darren Tucker <dtucker at dtucker.net> ---
The "noauth" penalty class in PerSourcePenalties should cover this
class of behaviour:
https://man.openbsd.org/sshd_config.5#PerSourcePenalties
The default penalty is 1 second, but you can increase it as desired.
PerSourcePenalties was introduced in OpenSSH 9.8.
Note that the Diffie-Helman algorithms have also been removed from the
default algorithm set in the development tree:
https://github.com/openssh/openssh-portable/commit/0051381a8c33740a77a1eca6859efa1c78887d80
This change has not yet made it into a released version, but will be in
the next major (ie 10.0) release.
-- 
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
    
    
More information about the openssh-bugs
mailing list