Re: Dropping brute force attacks

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thursday 10 January 2013 5:42:03 pm 叶雨飞 wrote:
> I would suggest look into use hashlimit module, which
> allow you to peek into /proc and have a better
> understanding what ip/block is triggering
>
> On Thu, Jan 10, 2013 at 10:55 AM, Dimitri Yioulos
>
> <dyioulos@xxxxxxxxxxxxx> wrote:
> > Hello, all, and Happy New Year.
> >
> > A few weeks ago I added a post about how to tweak the
> > set up of rules to  drop the ip addresses of machines
> > trying to do a brute force login via ipop3d.  What I've
> > noticed is that few, if any, addresses are being
> > dropped.  Fortunately, I have fail2ban installed on our
> > mail server, so the attacks are being blunted.  Still,
> > I'd like to cut these attacks off at the pass, so to
> > speak.  With you kind indulgence, allow me to provide
> > information on my set-up again so that perhaps someone
> > can help me get this working properly.
> >
> > Our mail server sits in a DMZ; NAT and Forward rules
> > are in place to make the mail server work (and it does,
> > very well).  So, what I did was set the Forward rules
> > to jump to a chain I created called "block_email_brute"
> > (the name sucks, but, hey).  Here are the rules:
> >
> > block_email_brute  tcp  --  anywhere
> > server.mydomain.com tcp dpt:pop3
> >
> > block_email_brute  tcp  --  anywhere
> > server.mydomain.com tcp dpt:smtp
> >
> > And here are the rules in the "block_email_brute"
> > chain:
> >
> >            tcp  --  anywhere            
> > server.mydomain.com tcp dpt:pop3 state NEW recent: SET
> > name: DEFAULT side: source
> >
> > LOG        tcp  --  anywhere            
> > server.mydomain.com tcp dpt:pop3 state NEW recent:
> > UPDATE seconds: 60 hit_count: 6 TTL-Match name:
> > DEFAULT25 side: source LOG level info prefix `Anti
> > Email Bruteforce: '
> >
> > DROP       tcp  --  anywhere            
> > server.mydomain.com tcp dpt:pop3 state NEW recent:
> > UPDATE seconds: 60 hit_count: 6 TTL-Match name: DEFAULT
> > side: source
> >
> >            tcp  --  anywhere            
> > server.mydomain.com tcp dpt:smtp state NEW recent: SET
> > name: DEFAULT25 side: source
> >
> > LOG        tcp  --  anywhere            
> > server.mydomain.com tcp dpt:smtp state NEW recent:
> > UPDATE seconds: 60 hit_count: 6 TTL-Match name:
> > DEFAULT25 side: source LOG level info prefix `Anti
> > Email Bruteforce: '
> >
> > DROP       tcp  --  anywhere            
> > server.mydomain.com tcp dpt:smtp state NEW recent:
> > UPDATE seconds: 60 hit_count: 6 TTL-Match name:
> > DEFAULT25 side: source
> >
> > ACCEPT     tcp  --  anywhere             anywhere
> > tcp flags:SYN,RST,ACK/SYN
> >
> > ACCEPT     tcp  --  anywhere             anywhere
> > tcp state RELATED,ESTABLISHED
> >
> > I realize that port 110 is the one being attacked, but
> > I added 25 just for good measure.
> >
> > I hope the above information is clear and complete
> > enough. Your help is greatly appreciated.
> >
> > Dimitri
> >
> > --
> > This message has been scanned for viruses and
> > dangerous content by MailScanner, and is
> > believed to be clean.
> >
> > --
> > To unsubscribe from this list: send the line
> > "unsubscribe netfilter" in the body of a message to
> > majordomo@xxxxxxxxxxxxxxx More majordomo info at 
> > http://vger.kernel.org/majordomo-info.html


I appreciate the suggestion, and will take a look at 
hashlimit.  But, why isn't rate-limiting working for me, as 
per the above rules?

-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.

--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux