mastodon.gamedev.place is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server focused on game development and related topics.

Server stats:

5.4K
active users

#sshd

1 post1 participant0 posts today
tjhowse<p>TIL of a deliberate source of Heisenbugs in the default sshd config:</p><p>MaxStartups 5:50:10</p><p>This means: Allow up to 5 simultaneous "starting" SSH connections. Between 5 and 10 starting connections, drop them randomly 50% of the time. Above 10: Do not allow any new SSH connections to start.</p><p>Took me a long time to diagnose why a particular combination of concurrent SSH processes would fail occasionally when connecting to this embedded machine.</p><p><a href="https://www.simplified.guide/ssh/limit-simultaneous-connections" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">simplified.guide/ssh/limit-sim</span><span class="invisible">ultaneous-connections</span></a></p><p><a href="https://howse.social/tags/sshd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshd</span></a> <a href="https://howse.social/tags/ansible" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ansible</span></a> <a href="https://howse.social/tags/swdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>swdev</span></a></p>
Peter N. M. Hansteen<p>So this happened:</p><p>Jan 30 03:07:16 skapet sshd-session[94311]: Failed password for invalid user "&gt; from 165.231.182.56 port 15613 ssh2</p><p>I wonder if we are seeing a variant of "gropefor database down, feeding raw html to the ssh gropebot" scenario again such as in <a href="https://nxdomain.no/~peter/so_somebody_is_throwing_html_at_your_sshd.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">nxdomain.no/~peter/so_somebody</span><span class="invisible">_is_throwing_html_at_your_sshd.html</span></a> <a href="https://mastodon.social/tags/sshgropers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshgropers</span></a> <a href="https://mastodon.social/tags/sshd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshd</span></a> <a href="https://mastodon.social/tags/passwordguessing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>passwordguessing</span></a> <a href="https://mastodon.social/tags/passwordgroping" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>passwordgroping</span></a> <a href="https://mastodon.social/tags/passwords" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>passwords</span></a> <a href="https://mastodon.social/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a></p>
:rss: Qiita - 人気の記事<p>XZ Utils backdoor (CVE-2024-3094) 解説<br><a href="https://qiita.com/naokiwa/items/203f558f5dd2a999b862?utm_campaign=popular_items&amp;utm_medium=feed&amp;utm_source=popular_items" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">qiita.com/naokiwa/items/203f55</span><span class="invisible">8f5dd2a999b862?utm_campaign=popular_items&amp;utm_medium=feed&amp;utm_source=popular_items</span></a></p><p><a href="https://rss-mstdn.studiofreesia.com/tags/qiita" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>qiita</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/xz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xz</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/sshd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshd</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/autotools" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>autotools</span></a> <a href="https://rss-mstdn.studiofreesia.com/tags/lzma" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>lzma</span></a></p>
WesMason<p>Today I did a writeup on a ssh client I love and adore. It's a cross platform (big 3) graphical client and I enjoy it as a replacement for WSL on windows and still give me a familiar view on Linux too.</p><p>But today's writeup was a bug report on the replaced ssh engine they put in the past week. Ssh keys are still broken for me and I discovered a few other things too along my investigation. It was a somewhat length dive for a github issue, but I hope it is well received, especially if it helps fix more issues.<br><a href="https://lifergeek.social/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://lifergeek.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://lifergeek.social/tags/sshd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshd</span></a> <a href="https://lifergeek.social/tags/github" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>github</span></a> <a href="https://lifergeek.social/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a></p>
Ariel (🐿 arc)<p>Bizarre OpenSSH/PAM/Nix-Home-Manager issues today. Looks like the daemon or PAM is refusing to acknowledge the symlink in `~/.nix-profile/bin/zsh` and so blocking SSH login.</p><p>It's also throwing bad password errors but I tried pasting the string in both `sudo passwd $USER` and the SSH password prompt.</p><p>`StrictModes=no` didn't have any positive affect.</p><p>User is working just fine otherwise, `/etc/shells` contains the location which matches `getent passwd`, symlink in `~/.nix-profile/bin/zsh` to the store is valid...</p><p><a href="https://eigenmagic.net/tags/OpenSSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSSH</span></a> <a href="https://eigenmagic.net/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://eigenmagic.net/tags/Nix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Nix</span></a> <a href="https://eigenmagic.net/tags/NixOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NixOS</span></a> <a href="https://eigenmagic.net/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> <a href="https://eigenmagic.net/tags/sshd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshd</span></a> <a href="https://eigenmagic.net/tags/HomeManager" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HomeManager</span></a></p>
jfmblinux :jeditux:<p>Ah ouais !!! 🤔<br>80.67.164.12 <br>2001.910.1400.115.12<br><span class="h-card" translate="no"><a href="https://toot.aquilenet.fr/@yunohost" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>yunohost</span></a></span> ça me surprend de voir ça 🤔</p><p><a href="https://mastodon.jfmblinux.fr/tags/fail2ban" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fail2ban</span></a> <a href="https://mastodon.jfmblinux.fr/tags/Postfix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Postfix</span></a> <a href="https://mastodon.jfmblinux.fr/tags/sshd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshd</span></a> <a href="https://mastodon.jfmblinux.fr/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.jfmblinux.fr/tags/SSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSH</span></a> <a href="https://mastodon.jfmblinux.fr/tags/Hacker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacker</span></a></p>
dexternemrod<p>And again it was an "include" in the sshd_config that caused some trouble. Still impressive how fast the bad login attempts accumulate on a fresh ip.</p><p> <a href="https://troet.cafe/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://troet.cafe/tags/sshd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshd</span></a></p>
Peter N. M. Hansteen<p>sshd(8) splitting continues <a href="https://www.undeadly.org/cgi?action=article;sid=20241014070554" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">undeadly.org/cgi?action=articl</span><span class="invisible">e;sid=20241014070554</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/openssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openssh</span></a> <a href="https://mastodon.social/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://mastodon.social/tags/sshd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshd</span></a> <a href="https://mastodon.social/tags/sshd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshd</span></a>-auth <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/authentication" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>authentication</span></a></p>
Jonathan Kamens<p>Another vestige of <a href="https://federate.social/tags/Ubuntu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ubuntu</span></a> from desktops that I recently switched to <a href="https://federate.social/tags/Debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Debian</span></a>, gone… A while ago Ubuntu decided <a href="https://federate.social/tags/sshd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshd</span></a> should run as a <a href="https://federate.social/tags/systemd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>systemd</span></a> socket instead of a service. I didn't like the change but didn't want to diverge from "standard" so I switched. But sometimes you have to ssh into a machine 2 or 3 times before it works, and when you upgrade systemd remotely the sshd socket can break and lock you out of the machine. I just switched back to using Debian standard ssh.service. 🎉<br><a href="https://federate.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a></p>
Julius Kaiser<p>"In a recent commit, Damien Miller (djm@) introduced the new sshd(8) configurations options, PerSourcePenalties and PerSourcePenaltyExemptList, to provide a built in facility in sshd(8) itself to penalize undesirable behavior, and to shield specific clients from penalty, respectively. "</p><p><a href="https://undeadly.org/cgi?action=article;sid=20240607042157" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">undeadly.org/cgi?action=articl</span><span class="invisible">e;sid=20240607042157</span></a></p><p><a href="https://mastodon.online/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://mastodon.online/tags/sshd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshd</span></a> <a href="https://mastodon.online/tags/sysadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sysadmin</span></a> <a href="https://mastodon.online/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.online/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.online/tags/selfhosted" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosted</span></a> <a href="https://mastodon.online/tags/selfhosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosting</span></a></p>
Liera :trans_furr_white: :drgn_flag_rainbow:<p>Don't forget to update your server if you're running a SSH server! Article below gives what versions are affected by this vulnerability :blobfoxcomfycomputer: </p><p><a href="https://www.qualys.com/regresshion-cve-2024-6387/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">qualys.com/regresshion-cve-202</span><span class="invisible">4-6387/</span></a></p><p><a href="https://tech.lgbt/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://tech.lgbt/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://tech.lgbt/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://tech.lgbt/tags/sshd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshd</span></a> <a href="https://tech.lgbt/tags/server" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>server</span></a></p>
steve mookie kong<p>Update your ssh server.</p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6387" rel="nofollow noopener noreferrer" target="_blank">https://nvd.nist.gov/vuln/detail/CVE-2024-6387</a></p><p><a href="https://mookiesplace.com/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://mookiesplace.com/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://mookiesplace.com/tags/sshd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshd</span></a></p>
Greg SlepakJust noticed that <span class="h-card"><a class="u-url mention" href="https://fosstodon.org/@fedora" rel="nofollow noopener noreferrer" target="_blank">@<span>fedora</span></a></span> doesn't have the fix for the latest serious <a class="hashtag" href="https://crib.social/tag/ssh" rel="nofollow noopener noreferrer" target="_blank">#ssh</a> exploit yet. Anyone know when the fix will make it in?<br><br><a href="https://news.ycombinator.com/item?id=40843778" rel="nofollow noopener noreferrer" target="_blank">https://news.ycombinator.com/item?id=40843778</a> <a class="hashtag" href="https://crib.social/tag/regresshion" rel="nofollow noopener noreferrer" target="_blank">#regresshion</a><br><br><a class="hashtag" href="https://crib.social/tag/linux" rel="nofollow noopener noreferrer" target="_blank">#linux</a> <a class="hashtag" href="https://crib.social/tag/fedora" rel="nofollow noopener noreferrer" target="_blank">#fedora</a> <a class="hashtag" href="https://crib.social/tag/sshd" rel="nofollow noopener noreferrer" target="_blank">#sshd</a> <a class="hashtag" href="https://crib.social/tag/openssh" rel="nofollow noopener noreferrer" target="_blank">#openssh</a> /cc <span class="h-card"><a class="u-url mention" href="https://mastodon.social/@decathorpe" rel="nofollow noopener noreferrer" target="_blank">@<span>decathorpe</span></a></span>
Jan Lehnardt :couchdb:<p>PSA: if you run a macOS Server (or just have “remote login” enabled in the Sharing pref pane) and want to protect against CVE-2024-6387, do update sshd_config as documented and you’re done. No need to restart sshd (and drop your connections / screen sharing port forwards) because on macOS launchd forks a new sshd process for each incoming connection. ✌️</p><p><a href="https://narrativ.es/tags/sshd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshd</span></a> <a href="https://narrativ.es/tags/macOSAdmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macOSAdmin</span></a> <a href="https://narrativ.es/tags/macOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macOS</span></a></p>
Anarchozionist/Datenprolet<p>Updatet eure <a href="https://chaos.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a>-Systeme!</p><p><a href="https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.qualys.com/vulnerabilitie</span><span class="invisible">s-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server</span></a></p><p><a href="https://chaos.social/tags/openssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openssh</span></a> <a href="https://chaos.social/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://chaos.social/tags/sshd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshd</span></a></p>
John Leonard<p>'Critical' vulnerability in OpenSSH uncovered, affects almost all Linux systems</p><p>14 million internet-facing servers are vulnerable, says Qualys</p><p><a href="https://www.computing.co.uk/news/4329906/critical-vulnerability-openssh-uncovered-affects-linux-systems" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">computing.co.uk/news/4329906/c</span><span class="invisible">ritical-vulnerability-openssh-uncovered-affects-linux-systems</span></a></p><p><a href="https://mastodon.social/tags/openssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openssh</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/sshd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshd</span></a> <a href="https://mastodon.social/tags/qualys" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>qualys</span></a> <a href="https://mastodon.social/tags/vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerability</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Lutra Security<p>Do you use OpenSSH?</p><p>This is a retorical question, of course you use OpenSSH. The TODO for today is: Update sshd!</p><p>⚠️CVE-2024-6387 - regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems</p><p><a href="https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">qualys.com/2024/07/01/cve-2024</span><span class="invisible">-6387/regresshion.txt</span></a></p><p><a href="https://infosec.exchange/tags/sshd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshd</span></a> <a href="https://infosec.exchange/tags/regreSSHion" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>regreSSHion</span></a> <a href="https://infosec.exchange/tags/CVE20246387" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE20246387</span></a></p>
Peter N. M. Hansteen<p>OpenSSH 9.8 released <a href="https://www.undeadly.org/cgi?action=article;sid=20240701102851" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">undeadly.org/cgi?action=articl</span><span class="invisible">e;sid=20240701102851</span></a> <a href="https://mastodon.social/tags/openbsd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openbsd</span></a> <a href="https://mastodon.social/tags/openssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openssh</span></a> <a href="https://mastodon.social/tags/ssh" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ssh</span></a> <a href="https://mastodon.social/tags/sshd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshd</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/crypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>crypto</span></a> <a href="https://mastodon.social/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a></p>
R. L. Dane :debian: :openbsd:<p><a href="https://fosstodon.org/tags/TIL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TIL</span></a> I learned that <a href="https://fosstodon.org/tags/Termux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Termux</span></a> (<a href="https://fosstodon.org/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> terminal/shell) has its own <a href="https://fosstodon.org/tags/sshd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sshd</span></a>, and it's freaking perfrect.</p>
DansLeRuSH ᴱᶰ<p>Useful against attempts to exploit <a href="https://floss.social/tags/SSHD" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSHD</span></a> :</p><p>« <a href="https://floss.social/tags/OpenSSH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSSH</span></a> introduces options to penalize undesirable behavior […] In a recent commit, Damien Miller (<span class="h-card" translate="no"><a href="https://cybervillains.com/@djm" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>djm</span></a></span>) introduced the new SSHD configurations options, "PerSourcePenalties" and "PerSourcePenaltyExemptList", to provide a built in facility in SSHD itself to penalize undesirable behavior, and to shield specific clients from penalty, respectively »</p><p>› <a href="https://undeadly.org/cgi?action=article;sid=20240607042157" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">undeadly.org/cgi?action=articl</span><span class="invisible">e;sid=20240607042157</span></a> </p><p><a href="https://floss.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a> <a href="https://floss.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://floss.social/tags/Exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploit</span></a></p>