Call for testing: openssh-9.8

Damien Miller djm at mindrot.org
Wed Jun 19 08:40:02 AEST 2024


On Tue, 18 Jun 2024, Chris Rapier wrote:

> Just curious, has this been tested at scale? I see that there are, by
> default, a maximum number of hosts it can track (default of 64k it
> seems). At that point I think one of two things happen - sshd stops
> allowing all connections until some of the banned IPs age out (with
> the exception of those IPs on an approved list) or it drops banned
> IPs from the head. I'm just wondering what happens in the event of a
> sustained attack from, say, a large botnet with more than 64K hosts.
>
> I think this is a good idea if people aren't using fail2ban but
> being that this is a relatively impactful change that could,
> unintentionally, lock out valid users (especially in attack scenarios)
> I'm somewhat hesitant to deploy in production without understanding
> this mechanism and testing results in a little more detail if
> available.

I suggest reading the documentation then:
https://man.openbsd.org/sshd_config.5#PerSourcePenalties

> overflow:mode
>    Controls how the server behaves when max-sources4 or max-sources6
>    is exceeded. There are two operating modes: deny-all, which
>    denies all incoming connections other than those exempted via
>    PerSourcePenaltyExemptList until a penalty expires, and permissive,
>    which allows new connections by removing existing penalties early
>    (default: permissive). Note that client penalties below the min
>    threshold count against the total number of tracked penalties. IPv4
>    and IPv6 addresses are tracked separately, so an overflow in one
>    will not affect the other.
>
> overflow6:mode
>    Allows specifying a different overflow mode for IPv6 addresses.
>    The default it to use the same overflow mode as was specified for
>    IPv4.



More information about the openssh-unix-dev mailing list