From owner-freebsd-ports@FreeBSD.ORG Sat Jul 16 18:48:29 2005 Return-Path: X-Original-To: ports@freebsd.org Delivered-To: freebsd-ports@FreeBSD.ORG Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id BFF5B16A41C for ; Sat, 16 Jul 2005 18:48:29 +0000 (GMT) (envelope-from ges+lists@wingfoot.org) Received: from wingfoot.org (caduceus.wingfoot.org [64.32.179.50]) by mx1.FreeBSD.org (Postfix) with ESMTP id 62F8C43D45 for ; Sat, 16 Jul 2005 18:48:29 +0000 (GMT) (envelope-from ges+lists@wingfoot.org) Received: from localhost (localhost [127.0.0.1]) by wingfoot.org (Postfix) with ESMTP id E06551F4405 for ; Sat, 16 Jul 2005 14:48:28 -0400 (EDT) Received: from wingfoot.org ([127.0.0.1]) by localhost (wingfoot.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 38155-09 for ; Sat, 16 Jul 2005 14:48:27 -0400 (EDT) Received: from [192.168.0.2] (ool-44c47f78.dyn.optonline.net [68.196.127.120]) by wingfoot.org (Postfix) with ESMTP id C644F1F4404 for ; Sat, 16 Jul 2005 14:48:27 -0400 (EDT) Message-ID: <42D95779.4040305@wingfoot.org> Date: Sat, 16 Jul 2005 14:52:41 -0400 From: Glenn Sieb Organization: Wingfoot Organization User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.6) Gecko/20050317 Thunderbird/1.0.2 Mnenhy/0.6.0.104 X-Accept-Language: en-us, en MIME-Version: 1.0 To: ports@freebsd.org X-Enigmail-Version: 0.89.5.0 X-Enigmail-Supports: pgp-inline, pgp-mime Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Virus-Scanned: by amavisd-new at wingfoot.org Cc: Subject: Just wondering, regarding OpenSSH. X-BeenThere: freebsd-ports@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Porting software to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 16 Jul 2005 18:48:29 -0000 Are there any plans for updating the openssh port to something newer than 3.6.1? The site shows they're up to 4.1 now. These lousy dictionary attacks keep happening, and could easily be quashed to a degree if the openssh we had would support the MaxAuthTries feature in sshd_config. I'm just curious if I should wait for this, or if I should just go ahead and update my openssh to something newer? (I'm on FreeBSD 4.11) Best, --Glenn -- "They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." ~Benjamin Franklin, Historical Review of Pennsylvania, 1759