For 2016, I has Arq backing up my computers to a USB hd hanging off my 68u router. I was using SFTP (entware) to as the protocol. Everything was working great -- happy happy.
Sometime 'in the last few months' this stopped working. At first I didn't think too much about it, but now it has been several months and I need to sort it out. I noticed that Dropbear has been updated several times in 2017 firmware updates (I'm typically timely with my updates; on 380.66_6 now).
Now Arq gets rejected by Dropbear because of too many (successful) logins during a period of time (~10s). (log below)
I have confirm with the Arq developer that they haven't made changes to how they connect and how many connections they make. They say they are doing the same thing in 2017 that they did in 2016.
Did Dropbear up its security game? Is there a way to relax it a bit? GUI setting or some text file to tweak?
TIA
```
Jun 26 09:56:36 dropbear[21758]: Child connection from 192.168.1.100:53432
Jun 26 09:56:37 dropbear[21758]: Password auth succeeded for 'belmontadmin' from 192.168.1.100:53432
Jun 26 09:56:37 dropbear[21758]: Exit (belmontadmin): Exited normally
Jun 26 09:56:38 dropbear[21762]: Child connection from 192.168.1.100:53450
Jun 26 09:56:38 dropbear[21762]: Password auth succeeded for 'belmontadmin' from 192.168.1.100:53450
Jun 26 09:56:40 dropbear[21762]: Exit (belmontadmin): Exited normally
Jun 26 09:56:40 dropbear[21765]: Child connection from 192.168.1.100:53452
Jun 26 09:56:41 dropbear[21765]: Password auth succeeded for 'belmontadmin' from 192.168.1.100:53452
Jun 26 09:56:42 dropbear[21769]: Child connection from 192.168.1.100:53453
Jun 26 09:56:42 dropbear[21769]: Password auth succeeded for 'belmontadmin' from 192.168.1.100:53453
Jun 26 09:56:42 dropbear[21769]: Exit (belmontadmin): Exited normally
Jun 26 09:56:42 dropbear[21765]: Exit (belmontadmin): Exited normally
Jun 26 09:56:43 dropbear[21792]: Child connection from 192.168.1.100:53455
Jun 26 09:56:44 dropbear[21792]: Password auth succeeded for 'belmontadmin' from 192.168.1.100:53455
Jun 26 09:56:45 dropbear[21795]: Child connection from 192.168.1.100:53457
Jun 26 09:56:46 dropbear[21795]: Password auth succeeded for 'belmontadmin' from 192.168.1.100:53457
Jun 26 09:56:46 dropbear[21795]: Exit (belmontadmin): Exited normally
Jun 26 09:56:47 syslog: Detect [192.168.1.100] abnormal logins many times, system will block this IP 5 minutes.
```
Sometime 'in the last few months' this stopped working. At first I didn't think too much about it, but now it has been several months and I need to sort it out. I noticed that Dropbear has been updated several times in 2017 firmware updates (I'm typically timely with my updates; on 380.66_6 now).
Now Arq gets rejected by Dropbear because of too many (successful) logins during a period of time (~10s). (log below)
I have confirm with the Arq developer that they haven't made changes to how they connect and how many connections they make. They say they are doing the same thing in 2017 that they did in 2016.
Did Dropbear up its security game? Is there a way to relax it a bit? GUI setting or some text file to tweak?
TIA
```
Jun 26 09:56:36 dropbear[21758]: Child connection from 192.168.1.100:53432
Jun 26 09:56:37 dropbear[21758]: Password auth succeeded for 'belmontadmin' from 192.168.1.100:53432
Jun 26 09:56:37 dropbear[21758]: Exit (belmontadmin): Exited normally
Jun 26 09:56:38 dropbear[21762]: Child connection from 192.168.1.100:53450
Jun 26 09:56:38 dropbear[21762]: Password auth succeeded for 'belmontadmin' from 192.168.1.100:53450
Jun 26 09:56:40 dropbear[21762]: Exit (belmontadmin): Exited normally
Jun 26 09:56:40 dropbear[21765]: Child connection from 192.168.1.100:53452
Jun 26 09:56:41 dropbear[21765]: Password auth succeeded for 'belmontadmin' from 192.168.1.100:53452
Jun 26 09:56:42 dropbear[21769]: Child connection from 192.168.1.100:53453
Jun 26 09:56:42 dropbear[21769]: Password auth succeeded for 'belmontadmin' from 192.168.1.100:53453
Jun 26 09:56:42 dropbear[21769]: Exit (belmontadmin): Exited normally
Jun 26 09:56:42 dropbear[21765]: Exit (belmontadmin): Exited normally
Jun 26 09:56:43 dropbear[21792]: Child connection from 192.168.1.100:53455
Jun 26 09:56:44 dropbear[21792]: Password auth succeeded for 'belmontadmin' from 192.168.1.100:53455
Jun 26 09:56:45 dropbear[21795]: Child connection from 192.168.1.100:53457
Jun 26 09:56:46 dropbear[21795]: Password auth succeeded for 'belmontadmin' from 192.168.1.100:53457
Jun 26 09:56:46 dropbear[21795]: Exit (belmontadmin): Exited normally
Jun 26 09:56:47 syslog: Detect [192.168.1.100] abnormal logins many times, system will block this IP 5 minutes.
```