[BlueOnyx:11959] Re: Blocking brute force SSH login attempts
Gerald Waugh
gwaugh at frontstreetnetworks.com
Wed Jan 9 17:30:39 -05 2013
On 01/09/2013 12:45 PM, Chuck Tetlow wrote:
> Interesting Gerald. VERY interesting!
>
> Those rules use some stuff that is new to me. And if those rules work
> - they'd be a GREAT asset to prevent hacking attempts. Much better
> than DFIX or mod_abl, since they do it in real-time and IPTables runs
> more efficiently than those programs in user-space.
>
> Have you tested these rules Gerald? Because if those rules work as
> intended - this could be the answer to our problems with people trying
> to hack in via FTP and POP. I'm not concerned about SSH, because I
> got tired of hacking attempts years ago and blocked TCP 22 and 23 at
> our front-door router (and switched SSH to a odd-ball port for
> access). But I think we're all still seeing those
> multiple-attempt-per-second scans trying to get valid usernames and
> guess passwords. These IPTables rules could put a end to that, and
> the DOS it causes when Dovecot goes down.
>
> Oh, and have you tried to log those actions? Like logging the DROP
> before doing it? I'd like to see some logging actions on what
> IPTables drops - both so we could know its working and so we could
> insure that its not the cause of a user issue.
>
> Thanks Gerald. I'm looking forward to playing with these rules and
> maybe improving our security.
>
I use these rules on all the servers I maintain, they work, and log to
/var/log/messages with "Block SSH Attack "
just change the port number and log-prefix
/sbin/iptables -A INPUT -i eth0 -p tcp -m tcp --dport 22 -m state
--state NEW -m recent --set --name SSH --rsource
/sbin/iptables -A INPUT -i eth0 -p tcp -m tcp --dport 22 -m state
--state NEW -m recent --update --seconds 60 --hitcount 8 --rttl --name
SSH --rsource -j LOG --log-prefix "Block SSH Attack "
/sbin/iptables -A INPUT -i eth0 -p tcp -m tcp --dport 22 -m state
--state NEW -m recent --update --seconds 60 --hitcount 8 --rttl --name
SSH --rsource -j DROP
--
Gerald
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.blueonyx.it/pipermail/blueonyx/attachments/20130109/1bbe7875/attachment.html>
More information about the Blueonyx
mailing list