I share the exact same philosophy Mike…I have F2B as my "last line" in a sense 
with my FW and cloud infosec devices taking the brunt of the attack at the 
border…and of course, both border devices are running some mix of 
auto-maintained and updated blacklists.  

Also, not sure what others may do, but I also run all email through a battery 
of SpamHaus and Barracuda lists…probably nothing more than a quick sanity check 
for the low-hanging fruit out there…


 

> On Jul 8, 2020, at 10:47 AM, Mike <t...@rohms.com> wrote:
> 
> 
> I agree with Antonio, this is all "part of a balanced diet" for a healthy 
> server.
> 
> One of my beefs with traditional blacklisting is how many rules are often 
> needed, or how many transactions needed to verify a host's authenticity.
> 
> Nowadays with everything cloud-based, and the ISPs nickel and diming us with 
> cpu power and disk space, I like to make things as efficient as possible.
> 
> I subscribe the "diminishing returns" philosophy.  I'd rather use a small 
> number of rules to block approximately 90% of the malicious traffic, than a 
> more comprehensive, more resource-intensive set that only adds a few extra 
> percent benefit.   I looked at a lot of other blacklists out there.  My first 
> line of defense is not using individual IP blocking rules.  I think systems 
> like that, such as F2B should second or third level defense.
> 
> By the way, I hear the guy behind Login Shield is working on two more 
> versions.  One interesting one is called, "WebShield" which is a similar 
> blacklist of different types of cloud providers (minus important search 
> engine systems) that basically blocks web level access from other servers.  
> This seems very interesting to me.  Ideally, people visiting my clients web 
> sites should not be originating from rackspace or hostgator or AWS - so why 
> allow that IP space access to web ports?   If you need to pander to people 
> running VPNs your milage may vary, but this sounds like another interesting 
> vector to shut off from certain server resources.  I'm hoping to beta test 
> that soon.
> 
>> I need to re-iterate what Mike is saying here and in fact, I would argue 
>> that if one is running an EM server without some type of SPAM + bad actor 
>> lists, they are remiss in their admin duties.  LoginShield is one of the 
>> many available out there with SpamHaus and Barracuda probably being the most 
>> prevalent or at least well known.  Another awesome repo is Firehol ( 
>> https://github.com/firehol/firehol <https://github.com/firehol/firehol>)…>> 
>> quite comprehensive but need to be careful as there's a lot to tune and 
>> therefore mess-up along the way…>> 
>> 
>>   
>> 
>>> On Jul 8, 2020, at 9:29 AM, Mike <t...@rohms.com <mailto:t...@rohms.com>> 
>>> wrote:
>>> 
>>> 
>>>> On 7/8/20 3:29 PM, Mike wrote:
>>>>> 
>>>>> As an aside, instead of using a recidive jail, I've been using a more 
>>>>> permanent ban of login ports using this system
>>>>> 
>>>>> https://github.com/dpsystems/login-shield 
>>>>> <https://github.com/dpsystems/login-shield>
>>>>> 
>>>>> This also includes logging of banned connections and some analysis 
>>>>> reports.
> _______________________________________________
> Fail2ban-users mailing list
> Fail2ban-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/fail2ban-users

_______________________________________________
Fail2ban-users mailing list
Fail2ban-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/fail2ban-users

Reply via email to