Groups | Search | Server Info | Login | Register
Groups > comp.os.linux.security > #707
| From | Supratim Sanyal <supratim@riseupnet.invalid.com> |
|---|---|
| Newsgroups | comp.os.linux.security |
| Subject | Re: yet another IP blocklist (mine!) |
| Date | 2016-11-22 18:49 -0500 |
| Organization | albasani.net |
| Message-ID | <MPG.329ea37bff320fd4989681@news.albasani.net> (permalink) |
| References | (1 earlier) <slrnnv84fd.9g.ibuprofin@planck.phx.az.us> <MPG.327c65692bdf48dc989683@news.eternal-september.org> <slrno17fn7.raa.ibuprofin@planck.phx.az.us> <MPG.327d9502ab733f6f989682@reader80.eternal-september.org> <slrno1a8cn.q8v.ibuprofin@planck.phx.az.us> |
In article <slrno1a8cn.q8v.ibuprofin@planck.phx.az.us>, ibuprofin@painkiller.example.tld.invalid says... > > On Fri, 28 Oct 2016, in the Usenet newsgroup comp.os.linux.security, in article > <MPG.327d9502ab733f6f989682@reader80.eternal-september.org>, Supratim Sanyal wrote: > > >ibuprofin@painkiller.example.tld.invalid says... > > >> Hits on 22/tcp have been relatively low for over a year (average > >> about 1.5 attempts per hour). > > >iptables + ipset with public blocklists has kept port 22 spam in > >control for my internet-facing servers for over a decade now > > A man page to look at (from 'tar -tvzf tcp_wrappers_7.6.tar.gz') > > -r--r--r-- 309/326 15225 1995-01-30 11:51 > tcp_wrappers_7.6/hosts_access.5 > > Notice the date. Then try 'man 5 hosts_access' It's part of the > tcp_wrappers or lib_wrap package from the last (April 1997) release > of that now unmaintained (but still useful) program. Look down at the > EXAMPLES section (about 9/10 of the way down the man-page). Either you > are "MOSTLY CLOSED" or "MOSTLY OPEN". Do you check the identity of > everyone trying to enter your house and only block them if they are on > a list? Or do you block everyone, and only allow those on a different > list in? Slight difference in practicality. Mentioned, I only > allow blocks where I know authorized users might be located. When I > (or other authorized users) were traveling to unknown places, the > firewall here would have port-knocking enabled (user tries to connect > to closed port $FOO and then $BAR - and the firewall would open from > that IP for 30 seconds to allow establishing a connection to 22/tcp). > That trick has been in use for over 30 years. Biggest problem with it > is that some firewalls on the Internet block outbound connections to > "unusual" ports, and that may prevent knocking port $BAZ or $QUX. > > >(your experience is far longer than mine) > > I actually was on DARPA net back in 1976 at NASA Ames, though it was > not a primary part of my job then. > > >but these blocklists are missing a vast number of port 23 bots. > > I'm not sure it's even possible to come up with a reasonably accurate > list - it changes so frequently. It's getting worse even now due to > the "Internet of Things" (commonly written as "IoT") which includes > all of the poorly designed devices in the modern home. Most of the > current crop of 'bots are unprotected DVD players, Internet-enabled > cameras, and similar. Search the Risks digest of the ACM (Association > for Computing Machinery) which you can find as the Usenet newsgroup > "news://comp.risks" on most news servers: > interesting - looks like mirai would have eventually got into your DVD players - looked up the password list it uses, it covers the ones your DVD players came with -- Supratim Sanyal DECnet VMSMAIL: QCOCAL::SANYAL (via HECnet) Internet email: http://mcaf.ee/sdlg9f QCOCAL - VAXserver 3900/OpenVMS 7.3 - telnet://sanyalnet-openvms- vax.freeddns.org CLOUDY - VAX-11/780/OpenVMS 7.3 - SET HOST from QCOCAL JUICHI - PDP-11/24/RSX-11M-PLUS - SET HOST from QCOCAL SunOS 5.11/Solaris 11 OpenIndiana: ssh sanyal.duckdns.org SanyalCraft Minecraft Server: sanyal.duckdns.org:25565 NTP servers: sanyalnet-ntp.freeddns.org,sanyalnet-cloud- vps.freeddns.org,sanyalnet-cloudvps2.freeddns.org Ad-Blocking Recursive DNS Servers: sanyalnet-cloud- vps.freeddns.org,sanyalnet-cloudvps2.freeddns.org WBRi Radio Stream: banglaradio.homeip.net:8000 Anonymous FTP: sanyal.duckdns.org / HTTP wrapper for FTP: http://sanyal.duckdns.org:81
Back to comp.os.linux.security | Previous | Next — Previous in thread | Next in thread | Find similar
yet another IP blocklist (mine!) Supratim Sanyal <supratim@riseup.invalid> - 2016-10-03 11:42 -0400
Re: yet another IP blocklist (mine!) Moe Trin <ibuprofin@painkiller.example.tld.invalid> - 2016-10-04 20:32 +0000
Re: yet another IP blocklist (mine!) Supratim Sanyal <supratim@riseup.invalid> - 2016-10-27 20:27 -0400
Re: yet another IP blocklist (mine!) Moe Trin <ibuprofin@painkiller.example.tld.invalid> - 2016-10-28 21:10 +0000
Re: yet another IP blocklist (mine!) Supratim Sanyal <supratim@riseup.invalid> - 2016-10-28 18:02 -0400
Re: yet another IP blocklist (mine!) Moe Trin <ibuprofin@painkiller.example.tld.invalid> - 2016-10-29 22:24 +0000
Re: yet another IP blocklist (mine!) Supratim Sanyal <supratim@riseupnet.invalid.com> - 2016-11-22 18:49 -0500
Re: yet another IP blocklist (mine!) Moe Trin <ibuprofin@painkiller.example.tld.invalid> - 2016-11-24 01:13 +0000
Re: yet another IP blocklist (mine!) Supratim Sanyal <supratim@riseupnet.invalid.com> - 2016-11-26 17:59 -0500
Re: yet another IP blocklist (mine!) Moe Trin <ibuprofin@painkiller.example.tld.invalid> - 2016-11-28 02:10 +0000
csiph-web