Idle Banter For non SV and non bike related chat (and the odd bit of humour - but if any post isn't suitable it'll get deleted real quick).![]() |
![]() |
|
Thread Tools |
![]() |
#1 |
Member
Mega Poster
Join Date: Mar 2004
Location: Not in Yorkshire. (Thank God)
Posts: 4,116
|
![]()
Am I wasting my time, or is it worthwhile
I run a small job every 5 minutes to look at some of my logs, where I detected failed ssh connections, failed mail relays, failed pop3, failed ftp etc. I block the source address in my iptables and add it to the config I apply on startup. I realise I am only blocking failed attempts retrying and many could simply refresh with a new address and restart their hacks against me. So am I wasting my computers time and I should be inspecting the successful connections to my server. Or is it worthwhile as it adds confusion to the hacker when his target no longer responds.
__________________
Not Grumpy, opinionated. |
![]() |
![]() |
![]() |
#2 |
Member
Mega Poster
Join Date: Jul 2006
Location: Sunny Croydonia
Posts: 6,124
|
![]()
how many "valid" IP addresses/users do you have?
Better not to whitelist than blacklist? Assuming that there is some kind of intranet/portal that your valid users can access using secure credentials, get someone to write some code that allows them to register their IP address with the SSH servers. They will only have to use the registration thing once and then again if they change their IP address. To make it even less user interactive, look at port knocking.
__________________
Sent from my PC NOT using any Tapatalk type rubbish!! █╬╬╬╬(•)i¯i▀▀▀▀▀█Ξ███████████████████████████████) |
![]() |
![]() |
![]() |
#3 |
Guest
Posts: n/a
|
![]() ![]() |
![]() |
![]() |
#4 |
Member
Mega Poster
Join Date: Jan 2008
Location: North West
Posts: 3,124
|
![]()
is this an internal service or internet facing? You may inadvertently block valid attempts if you are issuing addresses using dhcp, addresses will be recycled to the pool and potentially used next time by somebody that should be able to connect.
If the system can secure itself well enough, look for the serious attempts and ignore the remainder. |
![]() |
![]() |
![]() |
#5 |
Member
Mega Poster
Join Date: Jul 2003
Location: W Mids
Posts: 2,037
|
![]()
I say yes its worthwhile. While most of the attempts I got lasted 10-30min I had some that lasted 4-8hours and gave significant degradation in bandwidth. I'd also see all sorts of differing types of attack and its possible that there was a zero day exploit that was avoided being used by dropping them after the first few failures.
In my case I had a script that would detect 2 failures and then drop all future incoming packets, reloading the same IP list on boot (every 2-4 years ![]() Druid
__________________
'00 SV700S - '94 RVF400R - '97 RVF400R - '88 VFR750F |
![]() |
![]() |
![]() |
|
|
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
Mega Geek Question | -Ralph- | Idle Banter | 1 | 18-02-09 01:06 PM |
Proxy server - geek question | lukemillar | Idle Banter | 2 | 19-02-08 12:32 PM |
Quick and random geek question | MiniMatt | Idle Banter | 11 | 11-10-07 01:59 PM |
Another one for the geek bods (Mobile HD question) | Filipe M. | Idle Banter | 10 | 25-06-07 03:21 PM |
Geek question, re wireless networks | timwilky | Idle Banter | 2 | 21-06-07 09:58 PM |