On Fri 21/Jun/2024 14:55:16 +0200 Slavko via mailop wrote:
Dňa 21. júna 2024 11:50:23 UTC používateľ Alessandro Vesely via mailop 
<mailop@mailop.org> napísal:

That db currently holds 2,014,973 records.  Rather than ipset or single 
iptables rules, the IPs are stored on a Berkeley DB.  They get blocked by a few 
iptables rules ending in -j NFQUEUE.  That passes the packet to a userspace 
daemon which consults the database and decides whether to drop the packet or 
not.  See https://savannah.nongnu.org/projects/ipqbdb/

It's much more do-it-yourself than fail2ban.

I use fail2ban's bantime increment to incremental bantime with custom
action, which on configured repeat count adds IP to "permanent" ipset
(currently when bantime reach 60 days). That permanent ipset is daily
inspected (by cron job), its counters are stored in sqlite DB and removed
after (configurable -- currently 120 days) time of inactivity. Ipset itself
allows to process IPv6 in /64 manner, thus no need to worry.

While fighting with Submission/IMAP logins i found, that max ipset's
timeout (~24 days) is not enough to catch botnet repeating - common
repeat interval was ~50-60 days.


I keep them short. I track "good" IPs and don't report their failed logins. However, it's still possible for real users to flunk their password. This kind of bans have to rehabilitate rather quickly.

Login attempts don't seem to follow any kind of decent dictionary attack strategy, as they try random userid/ password combinations, and repeat failed ones.

Best
Ale
--




_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to