Hi,

   +-From: Mick McLaughlin <[email protected]> --
   |_Date: Fri, 23 Apr 2010 12:21:26 -0400 ______________
   |
   |I don't see how I can return null a 2nd time after getPassword() is called
   |unless I "hack" it to detect if it's already been asked for.

That hack will be needed for such a broken sshd implementation.
The correctly implemented sshds(including OpenSSH) will not 
accept such dozens auth failure trials.  In fact, OpenSSH will 
drop the TCP connections with a few auth error trials, and in some setting,
the user account will be locked.  I can not understand why your sshd
allows such DOS attacks.  Which sshd you are connecting to?

As for timeout for Session#connect, that timeout value is
for TCP connection establishment and read operations for socket,
and must not include the period for the success of authentication.

So, your approach is right.
  > Has anyone had similar problems such as this?  Currently I have to wrap the
  > connect method in my own thread that uses a Timer to keep track of my
  > timeout...


Sincerely,
--
Atsuhiko Yamanaka
JCraft,Inc.
1-14-20 HONCHO AOBA-KU,
SENDAI, MIYAGI 980-0014 Japan.
Tel +81-22-723-2150
    +1-415-578-3454
Skype callto://jcraft/
Twitter: @ymnk

------------------------------------------------------------------------------
_______________________________________________
JSch-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/jsch-users

Reply via email to