Skip to content

Why does aggressive mode result in multiple log messages for invalid sshd user logins? #3176

Answered by sebres
misterbayne asked this question in Q&A
Discussion options

You must be logged in to vote

I looked around online and discovered that I had to change the mode to be aggressive.

This is conditionally correct. This "limitation" is initially made to avoid issues like #1263 (prevent against false positives for users connecting to git et al via ssh with multiple public keys). The only exception was that an attempt to login (no matter public key or password) with invalid user causes a failure.
But it is not quite true now, since 9137c7b, newer fail2ban versions (>= 0.11.2 or 0.10.6) have a new parameter publickey, so it is possible to enable publickey failures without aggressive mode too, see #2765 (comment) for details.

So setting it to any in jail like below would count any kind …

Replies: 1 comment

Comment options

You must be logged in to vote
0 replies
Answer selected by sebres
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants