* Dropping brute force attacks
@ 2013-01-10 18:55 Dimitri Yioulos
[not found] ` <CAJygYd2u=N_26Ei1t049dP-yD6R9OUutF_bWTzYMcjqhgXyvNQ@mail.gmail.com>
0 siblings, 1 reply; 3+ messages in thread
From: Dimitri Yioulos @ 2013-01-10 18:55 UTC (permalink / raw)
To: netfilter
Hello, all, and Happy New Year.
A few weeks ago I added a post about how to tweak the set up
of rules to drop the ip addresses of machines trying to do
a brute force login via ipop3d. What I've noticed is that
few, if any, addresses are being dropped. Fortunately, I
have fail2ban installed on our mail server, so the attacks
are being blunted. Still, I'd like to cut these attacks
off at the pass, so to speak. With you kind indulgence,
allow me to provide information on my set-up again so that
perhaps someone can help me get this working properly.
Our mail server sits in a DMZ; NAT and Forward rules are in
place to make the mail server work (and it does, very
well). So, what I did was set the Forward rules to jump to
a chain I created called "block_email_brute" (the name
sucks, but, hey). Here are the rules:
block_email_brute tcp -- anywhere
server.mydomain.com tcp dpt:pop3
block_email_brute tcp -- anywhere
server.mydomain.com tcp dpt:smtp
And here are the rules in the "block_email_brute" chain:
tcp -- anywhere server.mydomain.com
tcp dpt:pop3 state NEW recent: SET name: DEFAULT side:
source
LOG tcp -- anywhere server.mydomain.com
tcp dpt:pop3 state NEW recent: UPDATE seconds: 60
hit_count: 6 TTL-Match name: DEFAULT25 side: source LOG
level info prefix `Anti Email Bruteforce: '
DROP tcp -- anywhere server.mydomain.com
tcp dpt:pop3 state NEW recent: UPDATE seconds: 60
hit_count: 6 TTL-Match name: DEFAULT side: source
tcp -- anywhere server.mydomain.com
tcp dpt:smtp state NEW recent: SET name: DEFAULT25 side:
source
LOG tcp -- anywhere server.mydomain.com
tcp dpt:smtp state NEW recent: UPDATE seconds: 60
hit_count: 6 TTL-Match name: DEFAULT25 side: source LOG
level info prefix `Anti Email Bruteforce: '
DROP tcp -- anywhere server.mydomain.com
tcp dpt:smtp state NEW recent: UPDATE seconds: 60
hit_count: 6 TTL-Match name: DEFAULT25 side: source
ACCEPT tcp -- anywhere anywhere
tcp flags:SYN,RST,ACK/SYN
ACCEPT tcp -- anywhere anywhere
tcp state RELATED,ESTABLISHED
I realize that port 110 is the one being attacked, but I
added 25 just for good measure.
I hope the above information is clear and complete enough.
Your help is greatly appreciated.
Dimitri
--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: Dropping brute force attacks
[not found] ` <CAJygYd2u=N_26Ei1t049dP-yD6R9OUutF_bWTzYMcjqhgXyvNQ@mail.gmail.com>
@ 2013-01-10 23:01 ` Dimitri Yioulos
2013-01-14 19:49 ` Dimitri Yioulos
0 siblings, 1 reply; 3+ messages in thread
From: Dimitri Yioulos @ 2013-01-10 23:01 UTC (permalink / raw)
To: netfilter
On Thursday 10 January 2013 5:42:03 pm 叶雨飞 wrote:
> I would suggest look into use hashlimit module, which
> allow you to peek into /proc and have a better
> understanding what ip/block is triggering
>
> On Thu, Jan 10, 2013 at 10:55 AM, Dimitri Yioulos
>
> <dyioulos@onpointfc.com> wrote:
> > Hello, all, and Happy New Year.
> >
> > A few weeks ago I added a post about how to tweak the
> > set up of rules to drop the ip addresses of machines
> > trying to do a brute force login via ipop3d. What I've
> > noticed is that few, if any, addresses are being
> > dropped. Fortunately, I have fail2ban installed on our
> > mail server, so the attacks are being blunted. Still,
> > I'd like to cut these attacks off at the pass, so to
> > speak. With you kind indulgence, allow me to provide
> > information on my set-up again so that perhaps someone
> > can help me get this working properly.
> >
> > Our mail server sits in a DMZ; NAT and Forward rules
> > are in place to make the mail server work (and it does,
> > very well). So, what I did was set the Forward rules
> > to jump to a chain I created called "block_email_brute"
> > (the name sucks, but, hey). Here are the rules:
> >
> > block_email_brute tcp -- anywhere
> > server.mydomain.com tcp dpt:pop3
> >
> > block_email_brute tcp -- anywhere
> > server.mydomain.com tcp dpt:smtp
> >
> > And here are the rules in the "block_email_brute"
> > chain:
> >
> > tcp -- anywhere
> > server.mydomain.com tcp dpt:pop3 state NEW recent: SET
> > name: DEFAULT side: source
> >
> > LOG tcp -- anywhere
> > server.mydomain.com tcp dpt:pop3 state NEW recent:
> > UPDATE seconds: 60 hit_count: 6 TTL-Match name:
> > DEFAULT25 side: source LOG level info prefix `Anti
> > Email Bruteforce: '
> >
> > DROP tcp -- anywhere
> > server.mydomain.com tcp dpt:pop3 state NEW recent:
> > UPDATE seconds: 60 hit_count: 6 TTL-Match name: DEFAULT
> > side: source
> >
> > tcp -- anywhere
> > server.mydomain.com tcp dpt:smtp state NEW recent: SET
> > name: DEFAULT25 side: source
> >
> > LOG tcp -- anywhere
> > server.mydomain.com tcp dpt:smtp state NEW recent:
> > UPDATE seconds: 60 hit_count: 6 TTL-Match name:
> > DEFAULT25 side: source LOG level info prefix `Anti
> > Email Bruteforce: '
> >
> > DROP tcp -- anywhere
> > server.mydomain.com tcp dpt:smtp state NEW recent:
> > UPDATE seconds: 60 hit_count: 6 TTL-Match name:
> > DEFAULT25 side: source
> >
> > ACCEPT tcp -- anywhere anywhere
> > tcp flags:SYN,RST,ACK/SYN
> >
> > ACCEPT tcp -- anywhere anywhere
> > tcp state RELATED,ESTABLISHED
> >
> > I realize that port 110 is the one being attacked, but
> > I added 25 just for good measure.
> >
> > I hope the above information is clear and complete
> > enough. Your help is greatly appreciated.
> >
> > Dimitri
> >
> > --
> > This message has been scanned for viruses and
> > dangerous content by MailScanner, and is
> > believed to be clean.
> >
> > --
> > To unsubscribe from this list: send the line
> > "unsubscribe netfilter" in the body of a message to
> > majordomo@vger.kernel.org More majordomo info at
> > http://vger.kernel.org/majordomo-info.html
I appreciate the suggestion, and will take a look at
hashlimit. But, why isn't rate-limiting working for me, as
per the above rules?
--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: Dropping brute force attacks
2013-01-10 23:01 ` Dimitri Yioulos
@ 2013-01-14 19:49 ` Dimitri Yioulos
0 siblings, 0 replies; 3+ messages in thread
From: Dimitri Yioulos @ 2013-01-14 19:49 UTC (permalink / raw)
To: netfilter
On Thursday 10 January 2013 6:01:24 pm Dimitri Yioulos
wrote:
> On Thursday 10 January 2013 5:42:03 pm 叶雨飞 wrote:
> > I would suggest look into use hashlimit module, which
> > allow you to peek into /proc and have a better
> > understanding what ip/block is triggering
> >
> > On Thu, Jan 10, 2013 at 10:55 AM, Dimitri Yioulos
> >
> > <dyioulos@onpointfc.com> wrote:
> > > Hello, all, and Happy New Year.
> > >
> > > A few weeks ago I added a post about how to tweak the
> > > set up of rules to drop the ip addresses of machines
> > > trying to do a brute force login via ipop3d. What
> > > I've noticed is that few, if any, addresses are being
> > > dropped. Fortunately, I have fail2ban installed on
> > > our mail server, so the attacks are being blunted.
> > > Still, I'd like to cut these attacks off at the pass,
> > > so to speak. With you kind indulgence, allow me to
> > > provide information on my set-up again so that
> > > perhaps someone can help me get this working
> > > properly.
> > >
> > > Our mail server sits in a DMZ; NAT and Forward rules
> > > are in place to make the mail server work (and it
> > > does, very well). So, what I did was set the Forward
> > > rules to jump to a chain I created called
> > > "block_email_brute" (the name sucks, but, hey). Here
> > > are the rules:
> > >
> > > block_email_brute tcp -- anywhere
> > > server.mydomain.com tcp dpt:pop3
> > >
> > > block_email_brute tcp -- anywhere
> > > server.mydomain.com tcp dpt:smtp
> > >
> > > And here are the rules in the "block_email_brute"
> > > chain:
> > >
> > > tcp -- anywhere
> > > server.mydomain.com tcp dpt:pop3 state NEW recent:
> > > SET name: DEFAULT side: source
> > >
> > > LOG tcp -- anywhere
> > > server.mydomain.com tcp dpt:pop3 state NEW recent:
> > > UPDATE seconds: 60 hit_count: 6 TTL-Match name:
> > > DEFAULT25 side: source LOG level info prefix `Anti
> > > Email Bruteforce: '
> > >
> > > DROP tcp -- anywhere
> > > server.mydomain.com tcp dpt:pop3 state NEW recent:
> > > UPDATE seconds: 60 hit_count: 6 TTL-Match name:
> > > DEFAULT side: source
> > >
> > > tcp -- anywhere
> > > server.mydomain.com tcp dpt:smtp state NEW recent:
> > > SET name: DEFAULT25 side: source
> > >
> > > LOG tcp -- anywhere
> > > server.mydomain.com tcp dpt:smtp state NEW recent:
> > > UPDATE seconds: 60 hit_count: 6 TTL-Match name:
> > > DEFAULT25 side: source LOG level info prefix `Anti
> > > Email Bruteforce: '
> > >
> > > DROP tcp -- anywhere
> > > server.mydomain.com tcp dpt:smtp state NEW recent:
> > > UPDATE seconds: 60 hit_count: 6 TTL-Match name:
> > > DEFAULT25 side: source
> > >
> > > ACCEPT tcp -- anywhere anywhere
> > > tcp flags:SYN,RST,ACK/SYN
> > >
> > > ACCEPT tcp -- anywhere anywhere
> > > tcp state RELATED,ESTABLISHED
> > >
> > > I realize that port 110 is the one being attacked,
> > > but I added 25 just for good measure.
> > >
> > > I hope the above information is clear and complete
> > > enough. Your help is greatly appreciated.
> > >
> > > Dimitri
> > >
> > > --
> > > This message has been scanned for viruses and
> > > dangerous content by MailScanner, and is
> > > believed to be clean.
> > >
> > > --
> > > To unsubscribe from this list: send the line
> > > "unsubscribe netfilter" in the body of a message to
> > > majordomo@vger.kernel.org More majordomo info at
> > > http://vger.kernel.org/majordomo-info.html
>
> I appreciate the suggestion, and will take a look at
> hashlimit. But, why isn't rate-limiting working for me,
> as per the above rules?
Bump - Can anyone else shed light on this?
Many thanks.
Dimitri
--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2013-01-14 19:49 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2013-01-10 18:55 Dropping brute force attacks Dimitri Yioulos
[not found] ` <CAJygYd2u=N_26Ei1t049dP-yD6R9OUutF_bWTzYMcjqhgXyvNQ@mail.gmail.com>
2013-01-10 23:01 ` Dimitri Yioulos
2013-01-14 19:49 ` Dimitri Yioulos
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).