Dealing with brute force attacks

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



Over the weekend one of our servers at a remote location was
hammered by an IP originating in mainland China.  This attack was
only noteworthy in that it attempted to connect to our pop3 service.

We have long had an IP throttle on ssh connections to discourage
this sort of thing.  But I had not considered the possibility that
other services were equally at risk.  Researching this on the web
does not reveal any comprehensive list of vulnerable ports or
services.  Most discussion centres on ssh, then some on ftp, and
relatively few regarding pop3.

So, my questions are these:

1. Should I throttle all new connections regardless of destination
ports?  In other words: are there any legitimate reasons that a
single IP would require more than one new connection every 30
seconds or so?

2. Moving pass the obvious and unhelpful "everything", what services
are particularly vulnerable to these types of attacks?  Does a list
exist anywhere?

Regards,

-- 
***          E-Mail is NOT a SECURE channel          ***
James B. Byrne                mailto:ByrneJB@xxxxxxxxxxxxx
Harte & Lyne Limited          http://www.harte-lyne.ca
9 Brockley Drive              vox: +1 905 561 1241
Hamilton, Ontario             fax: +1 905 561 0757
Canada  L8E 3C3

_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux