On Mon, 24 Nov 2025 12:58:47 +0000 (UTC)
RVP <[email protected]> wrote:

> You'll have to trace the forked child sshd instance...
> 

I think that is what "ktruss -d" option does.

> Can you add a line like:
> 
> ```
> user.*                                                /var/log/messages
> ```
> 
> to /etc/syslog.conf, reboot the system then check what messages `blocklistd'
> logs now?
> 
> -RVP

I have already checked this a few days ago on evbarm running
10.1_STABLE for which I did cvs update last week. There is nothing
useful reported in any of the logs.

# grep user /etc/syslog.conf 
user.*            /var/log/user.log


9.4_STABLE - sshd blocklisting works.
10.1_RELEASE and 10.1_STABLE - sshd blocklisting does not work.

Here is the problem:

If I attempt to log in as a valid user, but provide empty password, so
login eventually fails, then no failure is logged:
rp3# blocklistctl dump -a
        address/ma:port id      nfail   last access

If I repeat the above but with a non-existent user, then failure is
logged:
rp3# blocklistctl dump -a
        address/ma:port id      nfail   last access
       10.0.0.2/32:22           1/3     2025/11/24 15:08:34

Is this a bug, or login failures for valid users are for some reason
deliberately not passed by sshd to blocklistd?

Thanks.

Reply via email to