https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=270928

Jose Luis Duran <[email protected]> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |[email protected]

--- Comment #3 from Jose Luis Duran <[email protected]> ---
Another option could be to avoid passing BLACKLIST_BAD_USER (BL_BADUSER) to
BLACKLIST_NOTIFY, since per libblacklist(3) it is not supported yet.  As you
suggest, we could use BLACKLIST_AUTH_FAIL (BL_ADD).  This way, we do not modify
contrib/blocklist, but rather our own patches under crypto/openssh
(crypto/openssh/auth.c and crypto/openssh/auth-pam.c).

However, I was not able to reproduce this issue.  Invalid attempts were
effectively blocked (tested using pf and ipfw, following a basic guide:
https://people.freebsd.org/~lidl/blacklistd.html).

I wonder if it may have been fixed in bug #264599.

-- 
You are receiving this mail because:
You are the assignee for the bug.

Reply via email to