ArchLinux: 201507-17: openssh: authentication limits bypass
Summary
The OpenSSH server normally wouldn't allow successive authentications that exceed the MaxAuthTries setting in sshd_config, however when using kbd-interactive challenge-response authentication the allowed login retries can be extended limited only by the LoginGraceTime setting, that can be more than 10000 tries (depends on the network speed), and even more for local attacks.
Resolution
Upgrade to 6.9p1-2.
# pacman -Syu "openssh>=6.9p1-2"
The problems have been fixed upstream but no release is available yet.
References
https://seclists.org/fulldisclosure/2015/Jul/92 https://access.redhat.com/security/cve/CVE-2015-5600
Workaround
In case that public key authentication is properly configured and no
challenge-response authentication is required, deactivating
challenge-response and kbd-interactive authentication in
/etc/ssh/sshd_config via the following property mitigates this issue:
KbdInteractiveAuthentication no
ChallengeResponseAuthentication no