On Fri, 23 Sep 2005 21:24:26 -0700
Ray Percival <[EMAIL PROTECTED]> wrote:

> Yeah. This is only a threat against *really* weak boxes. Having said
> that I've seen a lot of posts talking about changing ports. That's a
> line that I won't cross. I refuse to hide from the bots and it's not
> even a speedbump against somebody who is a real threat. But that just
> my personalline in the sand. 

I agree, but I've personally been the victim of such an attack, it's a
pain in the ass when you can't su to root, or login on the console.

What they did was to exploit gzip, I'm fairly certain. I could not
apt-get of course and thus left helpless. I no longer have faith in user
passwords. I do my best to prevent people using common user names
(besides myself who uses 'ed' of course, but with a descent password).
The account abused was dominic/dominic, at the time this account was
created the box did not have ssh open, and it was never an idea to, but
then the service was opened and about 6 weeks later it was thoroughly
shafted.

I use the following now:

rdr pass on $ext_if proto tcp from any to 1.2.3.4 port {22,3389} ->
10.10.10.10

block quick drop from abuse_src

pass in on $ext_if proto tcp from any to $range port {22,3389} keep
state ( max-src-conn 3, max-src-conn-rate 2/5, overload flush global )

After several weeks I have accumulated a list of about 60 IP blocks. I
am wondering if block quick drop from abuse_src/24 is possible? But most
the IP addresses are not sequential.

-- 
A horse is a horse, of course, of course, And no one can talk to a
horse, of course, Unless, of course, the horse, of course, Is the famous
Mr. Ed! http://www.usenix.org.uk - http://irc.is-cool.net 

Reply via email to