Re: I love IP Tables....

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Sat, 26 May 2007 03:19:27 -0700, jdow wrote:

> From: "Amadeus W.M." <amadeus84@xxxxxxxxxxx>
>>
>>> People asked - here is the answer:
>>> # Then setup the reject trap
>>> $IPTABLES -A INPUT -p tcp --syn --dport 22 -m recent --name sshattack
>>> --set $IPTABLES -A INPUT -p tcp --dport 22 --syn -m recent --name
>>> sshattack \
>>>   --rcheck --seconds 180 --hitcount 2 -j LOG --log-prefix 'SSH REJECT:
>>>   '
>>> $IPTABLES -A INPUT -p tcp --dport 22 --syn -m recent --name sshattack
>>> \
>>>   --rcheck --seconds 180 --hitcount 2 -j REJECT --reject-with
>>>   tcp-reset
>>>
>>>
>>> Adapt it to your configuration, of course. {^_^}   (I probably should
>>> have included that in the first email for
>>>         politeness. Please 'scuse me.)
>>
>> You do know, that if you run ssh on your pet's birthday port, rather
>> than 22, you will not see any of the crap brute force attacks, don't
>> you?
> 
> Yes, but then I've faced enough port scans to realize that security
> through obscurity is horse feathers.
> 
> {^_-}

Enough port scans, yes, but have you seen any ssh brute force attack on a 
port other than 22? I'll give you a penny for any that you see.

Needless to say, the other security measures must still be in place. So 
even if they do figure out which port your sshd is running on, you still 
deal with them the way you normally do: allow connections from specific 
machines/ranges only and drop the rest. I'm only saying that hiding ssh 
will get rid of the scripts. 

At any rate, I really don't understand why they even bother with brute 
force. Do they ever find anything? 


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux