> How is this different to configuring /etc/securetty and tunnelling > Telnet over SSH Port Forwarding which I don't recommend BTW? P.S: The idea is about being able to Lockout a potential attacker very early in the protocol (before the key handshake happens) as a workaround until vulnerabilities can be properly fixed and not about Authenticating or Authorizing users for their regular login process. Manon _______________________________________________ openssh-unix-dev mailing list openssh-unix-dev@xxxxxxxxxxx https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev