The OpenSSH bug exposes the system to brute force cracking attacks.
OpenSSH is widely used to remotely access computers and servers. Usually, OpenSSH allows three or six logon attempts before closing the connection. However, Kingsley, a security researcher, recently disclosed a bug that allows attackers to execute thousands of authentication requests within two minutes after the logon window is opened. Therefore, attackers can use common combinations of passwords to launch brute-force cracking attacks. Brute-force cracking is a common threat. New vulnerabilities make the attack more effective. The server configured with SSH should limit the number of logon attempts or access IP addresses.
Install and configure OpenSSH in Ubuntu Server 13.10
Install OpenSSH remotely on Ubuntu
Solve the latency problem during remote login through OpenSSH
Offline installation of OpenSSH in Ubuntu 12.10
OpenSSH upgrade steps and precautions
Solutions for failures of common OpenSSH users
General thread: OpenSSH key management, Part 1 Understanding RSA/DSA authentication
Install OpenSSH and configure the sftp lock directory for RedHat
OpenSSL details: click here
OpenSSL: click here
This article permanently updates the link address: