Josip Almasi wrote:
Netstat shows me I have a dozen smtp connections from a dozen adresses, from bulgaria and russia and china, I thought they try to brute force crack my smtp auth so I just iptables them away. But turns out they change addresses and they brute force guess my server's usernames:)

Oh, bad Luck :-(

Long ago I decided to 'trust the force' and delete anything which failed the bayesian filter. That stops the backlog of messages for me but that may not be acceptable for you.

A while ago, like many people, I noticed those horrible scripts attempting dictionary attacks on the SSH daemon. In the end I implemented a fix I'd seen using iptables [1][2]. This involved dropping any attempts to login using SSH if that same IP address had previously failed to login for more than some threshold value. The ban on the IP address was set to half an hour.

I wonder if something similar could be implemented here? It's not quite the same as Greylisting as you penalise MTAs that try to connect too often. I guess if James doesn't limit the number of operations that the same MTA can perform using one connection this won't work anyway.

I do get a chuckle though when I run dmesg and see all the failed attempts to crack SSH ;-)

David Legg


[1] http://olivier.sessink.nl/publications/blacklisting/index.html
[2] http://www.la-samhna.de/library/brutessh.html


---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to