Re: SSH scans vs connection ratelimiting

看板FB_security作者時間19年前 (2006/08/30 14:54), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串16/16 (看更多)
Just to put an end to this sillyness :) A few days ago, I wrote: > For months now, we're all seeing repeated bruteforce attempts on SSH. > I've configured my pf install to ratelimit TCP connections to port 22 > and to automatically add IP-addresses that connect too fast to a table > that's filtered: <snip> > This works as expected, IP-addresses are added to the 'lamers'-table > every once in a while. > > However, there apparently are SSH bruteforcers that simply use one > connection to perform a brute-force attack: As mysteries go, this one was a PEBKAC, too. My pf config had a 'deny all'-statement, but only for the external interface. A tunnel interface wasn't filtered in any way and no ratelimiting was taking place for the SSH daemon bound on that tunnel interface's address, hence the succeeding scans. Sorry for the confusion, Pieter _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #14zJOj00 (FB_security)
討論串 (同標題文章)
文章代碼(AID): #14zJOj00 (FB_security)