Re: OT: Security....

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, 2004-11-02 at 11:04 +0900, Joel wrote:
> Permanent black holes are not a good idea, of course, and that was
> discussed. I don't think I'd use the two day timeouts that someone
> mentioned for his setup, I'd think more in terms of thirty minutes.
> Possibly lengthen that a little if I got repeats.
> 

I'm the guy who started out by describing his "fly-trap" technique with
Portsentry and Shorewall and the poster of the two-day timeout. The
reason I chose that period, iteratively and with careful trials, is that
it resulted in (a) almost zero repeat attacks from IP addresses after
being unblocked, and (b) only about 20 hosts in the entire Internet
being blocked at any given time.

The key in this case is careful selection of the "hostile" ports.
However, any given technique you choose will have its own quirks and
should be tested independently. Starting testing out at an hour and then
expanding to see the results is eminently reasonable; I just thought you
should know that two days works like a charm with THIS technique and on
MY web server, over the last two years or so.

Your mileage may (and probably will) vary, so of course test carefully.

Cheers,

-- 
Rodolfo J. Paiz <rpaiz@xxxxxxxxxxxxxx>

Attachment: signature.asc
Description: This is a digitally signed message part


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux