On 06/30/17 09:10, jdow wrote:
> A rule like this makes cracking your 123456 password a whole lot harder 
> without
> changing anything else.
> iptables -t filter -A IN_public_deny -p tcp --dport pop3s --syn -m recent 
> --name
> pop3s_attack --rcheck --seconds 90 --hitcount 2 -j LOG --log-prefix 'SSH2 
> REJECT: '
> --log-level info
>
> The magic is in "-m recent --rcheck --seconds 90 --hitcount 2". That means any
> given site gets one chance to login before facing a 90 second blockage. If 
> they
> have to guess "AZBYCXDW" as a password you can imagine how long you have to 
> catch
> him in your log and explicitly block his whole subnet. 


I once did rate limiting on brute force login attempts.  But I found that all 
the
attempts were scripted.  So instead of an attack from a single IP address 
happening
for a minute or so the attack simply went on for hours.  The same number of 
attempts
were made.

I didn't manually check my logs.  I left that to an automated process.

But I got tired of setting all that up for systems that were temporary in my
environment but yet required full access when I was not physically present.

-- 
Fedora Users List - The place to go to speculate endlessly

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org

Reply via email to