Josip Almasi wrote:
Usually a few seconds timeout is just fine protection against bruteforce attacks. It may not be as good against dictionary attacks, but its up to admin to disallow weak passwords.
So IMHO auth handler should just sleep a a bit after unsucessfull auth.
This is similar to another technique called Tarpitting [1]. This inserts a small (but increasing) delay after each RCPT TO command. Another technique is called Teergrubing [2] where you deliberately try to keep a spambot on the line as long as possible with the theory that while you keep it hanging around its spam sending capacity is severely curtailed.

Then again, that's why attacker does not wait for the response, he just opens another socket and tries again:) And thats where the iptables trick kick in;)

Ah! I see... that's clever! I see now why you would get so many re-connections.

Regards,
David Legg

[1] http://www.palomine.net/qmail/tarpit.html
[2] http://www.iks-jena.de/mitarb/lutz/usenet/teergrube.en.html

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to