On 06/29/2017 06:10 PM, jdow wrote:
A rule like this makes cracking your 123456 password a whole lot harder without changing anything else. iptables -t filter -A IN_public_deny -p tcp --dport pop3s --syn -m recent --name pop3s_attack --rcheck --seconds 90 --hitcount 2 -j LOG --log-prefix 'SSH2 REJECT: ' --log-level info

The magic is in "-m recent --rcheck --seconds 90 --hitcount 2". That means any given site gets one chance to login before facing a 90 second blockage. If they have to guess "AZBYCXDW" as a password you can imagine how long you have to catch him in your log and explicitly block his whole subnet.

Yes, the rule I have is similar to that, but I use Firewall Builder to generate the rules.

-A INPUT -p tcp -m tcp --dport 22 -m state --state NEW -m hashlimit --hashlimit 1/minute --hashlimit-mode srcip --hashlimit-name ssh --hashlimit-htable-size 512 -j ACCEPT
_______________________________________________
users mailing list -- users@lists.fedoraproject.org
To unsubscribe send an email to users-le...@lists.fedoraproject.org

Reply via email to