RE: Questions concerning Security Log

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> -----Original Message-----
> >  I would disagree a bit. Denying access after a small number of
> > unsuccessful logons effectively reduces the bandwidth of 
> anyone attempting
> > a brute force attack, script kiddie or pro. Changing ports 
> may hide you
> > from script kiddies but not from a pro.
> 
> Not so sure I would agree with this.  If they are hammering 
> you then yes.  But 
> if they watch their logs then they will see that after X 
> attempts they are no 
> longer getting a reply then they could (at least I would) add 
> time in between 
> requests.  Sooner or later they will find the right time 
> intervals and they 
> are back in business again.
> 
> Ex;  you set a 5 attempt/5 minutes.  they change this script 
> to wait 61 sec 
> between attempt they are back in business.

Exactly - you've reduced their bandwidth, exactly the same as the standard
logon daemon does - so many command line login failures and it sleeps for a
while. In a brute force attack bandwidth is key, reduce it and generally the
attacker will move to an easier target. The current crop of SSH script
kiddies will definitely move on.

A determined (and capable) attacker can always carefully time their attacks
(and use multiple IPs), but you've made it much harder (i.e. slower). So you
slow them down, you insist on good passwords, and you check your logs. And
if it's reasonable you change ports - but security through obscurity alone
is generally a Bad Idea.

Brian


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux