Re: (PerSource)Penalties default perhaps too aggressive?

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



On 12.09.25 12:08, hvjunk wrote:
I understand that the purpose of this script is to use the (one)
working keypair(s) to "put the other ones on the server". How does
it handle *that* objective in cases where it cannot observe the
storage the pubkey is / may be in? And what behavior do you *want*
in such a case?

What you are trying to do here

Simply put, this question equates to "does it actually make any *sense* to try individual logins with every single privkey available?".

If you want pubkeys that are allowed to log in, but absent from
~/.ssh/authorized_keys specifically, to get added to *that* file nonetheless, the information whether some other, potentially invisible mechanism *already* blesses them is completely useless to the algorithm-to-be.

All you need in that case is *one* working login with *whichever* auth that works, and as I said, the only sane approach to do that is to assume that the user has a setup that *already works* for the *completely normal* SSH login. Including individually tweaked server-side rate limits or even more fancy setups (elaborate "Match"es in the client's ~/.ssh/config?), if such is necessary.

Kind regards,
--
Jochen Bern
Systemingenieur

Binect GmbH

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux