Shell/Self Defense: Unterschied zwischen den Versionen

Aus Doc-Wiki
Zur Navigation springen Zur Suche springen
imported>Burghardt
(Die Seite wurde neu angelegt: „Back to Shell ---- To fight brute force attacks we tried several mechanisms including fail2ban, knockd and rate limiting. All of them worked technically cor…“)
 
imported>Burghardt
Zeile 2: Zeile 2:
 
----
 
----
   
To fight brute force attacks we tried several mechanisms including fail2ban, knockd and rate limiting. All of them worked technically correctly. But all of them could not reduce the attacks to an acceptable low level. One consequence is the introduction of [[#2FA]] as a requirement.
+
To fight brute force attacks we tried several mechanisms including fail2ban, knockd and rate limiting. All of them worked technically correct. But all of them did ''not'' reduce the attacks to an acceptable low level. One consequence is the introduction of [[#2FA]] as a requirement.
   
 
=== Blacklists ===
 
=== Blacklists ===

Version vom 3. April 2017, 10:51 Uhr

Back to Shell


To fight brute force attacks we tried several mechanisms including fail2ban, knockd and rate limiting. All of them worked technically correct. But all of them did not reduce the attacks to an acceptable low level. One consequence is the introduction of #2FA as a requirement.

Blacklists

Finally — as of 08.August 2016 — there are several external(!) lists involved. These lists are queried twice a day and a simple "iptables ... -j DROP" evaluates an aggregated list. It contains more than 40000 single addresses and 900 networks. The attempts to login as root dropped from >10000 (peaks were >80000) per day to a few dozen.

Please give feedback if you feel this list to be too restrictive.



Back to Shell