I need to re-iterate what Mike is saying here and in fact, I would argue that 
if one is running an EM server without some type of SPAM + bad actor lists, 
they are remiss in their admin duties.  LoginShield is one of the many 
available out there with SpamHaus and Barracuda probably being the most 
prevalent or at least well known.  Another awesome repo is Firehol 
(https://github.com/firehol/firehol <https://github.com/firehol/firehol>)…quite 
comprehensive but need to be careful as there's a lot to tune and therefore 
mess-up along the way…

  

> On Jul 8, 2020, at 9:29 AM, Mike <t...@rohms.com> wrote:
> 
> 
>> On 7/8/20 3:29 PM, Mike wrote:
>>> 
>>> As an aside, instead of using a recidive jail, I've been using a more 
>>> permanent ban of login ports using this system
>>> 
>>> https://github.com/dpsystems/login-shield
>>> 
>>> This also includes logging of banned connections and some analysis reports.
>> 
>> That is an original/unusual approach... The software seems to be merely a 
>> list of IP ranges that get blocked with iptables. I figure the list of IPs 
>> need to be updated somehow via git update ? this also means the list is 
>> updated by the (sole) maintainer ? also via git ?
>> 
>> A more usual approach is to have a client/server architecture where each 
>> client that detects an offending IP uploads it to the server. All other 
>> clients will then recieve the new IP and add it to their block list (even if 
>> it hasn't tried to break in yet), sort of how some antivirus and some spam 
>> detection software work.
> 
> It's really not that unusual an approach.  Most sysadmins maintain their own 
> blacklists or whitelists.  This is somebody sharing theirs, and it is 
> regularly updated.   And it's designed in such a way that you can customize 
> it.  Obviously like any system of this sort, it has to be maintained.   I 
> prefer this to say, the standard DNS-based blacklists, but I use those too.  
> But as a first line of defense, if for example, you don't have any reason for 
> people in China to be trying to check IMAP or SSH credentials, you can just 
> wholesale block the lion's share of that IP space with no more than a dozen 
> or two iptables rules.  I think it's much more efficient than maintaining a 
> real time, shared blacklist.   And in either case, there's always a 
> possibility of a false positive.
> 
> I've found this works much better in concert with F2B.  I've reduced the 
> stress on F2B significantly.
> 
> Another issue is, if someone is operating a centrally located blacklist, it 
> can be an attack vector.  Unless hackers want to DDOS github, this is a way 
> to implement blacklisting in a safer way.
> 
> I still rely on F2B but found this is a good compliment.  Like others here, I 
> got tired of seeing repeat offenders.  And the recidive function is nice, but 
> it's still way more granular and resource hogging as it should be.  With the 
> ability, for example, to stop an entire class A or B block of space with a 
> single firewall command, that's really resource efficient.
> 
> I'm also seeing botnets get much more sophisticated.   I'm seeing them learn 
> the bantimes and maxtries variables and working around them automatically.  
> I'm seeing them execute coordinated attacks from a diverse array if IPs that 
> go uncaught by F2B.
> 
> It's not foolproof.  Nothing is.  But I've now been running this for several 
> months and it's been really impressive, like catching 98% of most login 
> attempts before they even get to F2B.   I've seen similar blacklists out 
> there, for example, coving all cn or br IP space, but I don't think you can 
> catch all, and I'd rather use 20 block rules and catch 98% than 400 block 
> rules and catch 99%.  I let F2B catch the stuff left over.
> 
> 
> 
> _______________________________________________
> Fail2ban-users mailing list
> Fail2ban-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/fail2ban-users

_______________________________________________
Fail2ban-users mailing list
Fail2ban-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/fail2ban-users

Reply via email to