https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=270928
Jose Luis Duran <[email protected]> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |[email protected] --- Comment #3 from Jose Luis Duran <[email protected]> --- Another option could be to avoid passing BLACKLIST_BAD_USER (BL_BADUSER) to BLACKLIST_NOTIFY, since per libblacklist(3) it is not supported yet. As you suggest, we could use BLACKLIST_AUTH_FAIL (BL_ADD). This way, we do not modify contrib/blocklist, but rather our own patches under crypto/openssh (crypto/openssh/auth.c and crypto/openssh/auth-pam.c). However, I was not able to reproduce this issue. Invalid attempts were effectively blocked (tested using pf and ipfw, following a basic guide: https://people.freebsd.org/~lidl/blacklistd.html). I wonder if it may have been fixed in bug #264599. -- You are receiving this mail because: You are the assignee for the bug.
