I suspect the distributed cracking will move to the same pattern as the SMTP/pop3 brute force guys did and use one IP per x+1 seconds where x=the ssh penalty window. We have seen this on our customer facing smtp server where we have hundreds of remote compromised IPs trying each one password per 30-60min. Still, I welcome this change as there are enough single prick attackers out there where this will help cut down on the size of the logs to process / digest.
catkitcourt|1 year ago
superjan|1 year ago
iforgotpassword|1 year ago
So looks like this openssh feature is a decade late.
lathiat|1 year ago