On Saturday, October 15, 2011 06:13:02 PM Jon Elson did opine:
> gene heskett wrote:
> > I'll second those sentiments, Kent. I hope the logs are being kept
> > for forensic purposes. Tracing the src IP could well be
> > enlightening.
>
> Normally the hackers use other hacked-into computers, and don't leave
> traces of
> their original computer. They may use several layers of botnets to make
> it quite
> hard to trace their original IP.
>
All too likely to be true.
> One thing I have found to be really helpful (after securing all servers
> on the
> machine) is to use the denyhosts program, that watches for failed login
> attempts and then
> adds the source IP to the hosts.deny list. This uses one list for all
> modes of access, all account names (valid and not). If you set this to
> a fairly tight setting, such as 3 login failures from the same IP in a
> month gets you kicked off for a year, it makes it very hard for even
> large botnets to have any possibility of cracking a decent password.
>
> Haven't had any breakins in a long time, and all the professionals have
> given up when the probe my system and find out how tight I have the
> security set.
>
> Jon
>
I have a netgear router doing NAT, and am using fail2ban, which works
similarly but with a shorter recovery by default. fail2ban has not been
tripped in the year since I installed it. That faint knocking sound? Its
me, knocking on my head as a substitute for wood. ;-)
However, traffic seems to have come to a halt since I lost my web pages dns
entry at DynDns. Some damned squatter grabbed it instantly. I have
visions of a length of rope, a tall oak tree and a shovel. :(
Cheers, Gene
--
"There are four boxes to be used in defense of liberty:
soap, ballot, jury, and ammo. Please use in that order."
-Ed Howdershelt (Author)
"Life and death are seldom logical."
"But attaining a desired goal always is."
-- McCoy and Spock, "The Galileo Seven", stardate 2821.7
------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2d-oct
_______________________________________________
Emc-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/emc-users