Shell/Self Defense: Unterschied zwischen den Versionen

Aus Doc-Wiki
Zur Navigation springen Zur Suche springen
imported>Burghardt
(Die Seite wurde neu angelegt: „Back to Shell ---- To fight brute force attacks we tried several mechanisms including fail2ban, knockd and rate limiting. All of them worked technically cor…“)
 
imported>Burghardt
 
(Eine dazwischenliegende Version desselben Benutzers wird nicht angezeigt)
Zeile 2: Zeile 2:
 
----
 
----
   
To fight brute force attacks we tried several mechanisms including fail2ban, knockd and rate limiting. All of them worked technically correctly. But all of them could not reduce the attacks to an acceptable low level. One consequence is the introduction of [[#2FA]] as a requirement.
+
To fight brute force attacks we tried several mechanisms including fail2ban, knockd and rate limiting. All of them worked technically correct. But all of them did ''not'' reduce the attacks to an acceptable low level. One consequence is the introduction of [[#2FA]] as a requirement.
   
 
=== Blacklists ===
 
=== Blacklists ===
Finally &mdash; as of 08.August 2016 &mdash; there are several external(!) lists involved. These lists are queried twice a day and a simple "<tt>iptables ... -j DROP</tt>" evaluates an aggregated list. It contains ''more than 40000 single addresses and 900 networks''. The attempts to login as root dropped from >10000 (peaks were >80000) per day to a few dozen.
+
Finally &mdash; as of 08.August 2016 &mdash; there are several external(!) lists involved. These lists are queried twice a day and a simple "<tt>iptables ... -j DROP</tt>" evaluates an aggregated list. It contains ''more than 40000 single addresses and 900 networks''. The number of entries is highly dynamic. Peaks got over a 110000 entries...
  +
  +
The attempts to login as root dropped from >10000 (peaks were >80000) per day to a few dozen.
   
 
* "http://www.projecthoneypot.org/list_of_ips.php?t=d&rss=1" # Project Honey Pot Directory of Dictionary Attacker IPs
 
* "http://www.projecthoneypot.org/list_of_ips.php?t=d&rss=1" # Project Honey Pot Directory of Dictionary Attacker IPs

Aktuelle Version vom 19. April 2017, 07:11 Uhr

Back to Shell


To fight brute force attacks we tried several mechanisms including fail2ban, knockd and rate limiting. All of them worked technically correct. But all of them did not reduce the attacks to an acceptable low level. One consequence is the introduction of #2FA as a requirement.

Blacklists

Finally — as of 08.August 2016 — there are several external(!) lists involved. These lists are queried twice a day and a simple "iptables ... -j DROP" evaluates an aggregated list. It contains more than 40000 single addresses and 900 networks. The number of entries is highly dynamic. Peaks got over a 110000 entries...

The attempts to login as root dropped from >10000 (peaks were >80000) per day to a few dozen.

Please give feedback if you feel this list to be too restrictive.



Back to Shell