[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#277207: marked as done (ssh: MaxStartups 10:30:60)



Your message dated Tue, 7 May 2013 10:54:11 +0100
with message-id <20130507095411.GA10376@riva.ucam.org>
and subject line Re: Bug#277207: ssh: MaxStartups 10:30:60
has caused the Debian Bug report #277207,
regarding ssh: MaxStartups 10:30:60
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
277207: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=277207
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: ssh
Version: 1:3.8.1p1-8.sarge.1
Severity: normal



-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Kernel: Linux 2.6.8-1-686
Locale: LANG=C, LC_CTYPE=C

Versions of packages ssh depends on:
ii  adduser                     3.59         Add and remove users and groups
ii  debconf                     1.4.39       Debian configuration management sy
ii  dpkg                        1.10.23      Package maintenance system for Deb
ii  libc6                       2.3.2.ds1-18 GNU C Library: Shared libraries an
ii  libpam-modules              0.76-22      Pluggable Authentication Modules f
ii  libpam-runtime              0.76-22      Runtime support for the PAM librar
ii  libpam0g                    0.76-22      Pluggable Authentication Modules l
ii  libssl0.9.7                 0.9.7d-5     SSL shared libraries
ii  libwrap0                    7.6.dbs-6    Wietse Venema's TCP wrappers libra
ii  zlib1g                      1:1.2.2-1    compression library - runtime

-- debconf information:
  ssh/insecure_rshd:
  ssh/privsep_ask: true
* ssh/user_environment_tell:
* ssh/forward_warning:
  ssh/insecure_telnetd:
  ssh/new_config: true
* ssh/use_old_init_script: true
* ssh/SUID_client: true
  ssh/disable_cr_auth: false
* ssh/privsep_tell:
  ssh/ssh2_keys_merged:
* ssh/protocol2_only: true
  ssh/encrypted_host_key_but_no_keygen:
* ssh/run_sshd: true

# diff sshd_config sshd_config2
15a16,18
> # After 10 unauthenticated connections, refuse 30% of the new ones, 
and
> # refuse any more than 60 total.
> MaxStartups 10:30:60
# 
 
 Cheers,

--
Yashy


--- End Message ---
--- Begin Message ---
Source: openssh
Source-Version: 1:6.1p1-3

On Tue, Oct 19, 2004 at 01:16:03AM -0400, at at wrote:
> # diff sshd_config sshd_config2
> 15a16,18
> > # After 10 unauthenticated connections, refuse 30% of the new ones, 
> and
> > # refuse any more than 60 total.
> > MaxStartups 10:30:60

I think this was essentially handled by the change of MaxStartups'
default from 10 to 10:30:100, made upstream in 6.2p1 and backported to
1:6.1p1-3.

Thanks,

-- 
Colin Watson                                       [cjwatson@debian.org]

--- End Message ---

Reply to: