On 18/Apr/09 21:34, Sam Varshavchik wrote:
> The real value-added is when an existing connection gets blocked.
> Blocking the inbound packets causes the connection to stall until it
> times out. Blocking the outbound packets, with REJECT, rather than drop,
> should end up clearing the socket immediately on the server side.
It works! It doesn't happen very often, but sometimes someone gets a hold on
the daemon and tries various userid/passwords. (I have to note that, from the
log I saw, existing attacks are not "serious" at all, since the user names
tried were not real ones. Presumably they are just testing that software.)
To recap, with naive setup, MAXPERIP=64 and tarpit enabled, someone tried 5000
user/password pairs in 5 minutes.
Blocking new connections from specific addresses that caused a number of LOGIN
FAILED, still allowed someone to try 600+ pairs in a single connection.
In January I configured the server for blocking existing connections and
yesterday it fired. I have
# iptables -vL OUTPUT
Chain OUTPUT (policy ACCEPT 8908K packets, 4890M bytes)
pkts bytes target prot opt in out source destination
27 1266 REJECT tcp -- any any anywhere anywhere
tcp flags:!FIN,SYN,RST,ACK/SYN mark match 0x4 reject-with tcp-reset
Not sure if those 27 packets were from different connections.
It blocked a few hundred packets from that IP, since February
# ibd-del -Lv
IP CREATED PROB. BLOCKED PACKETS UPDATED DECAY
THRESHOLD CAUGHT DESCRIPTION
218.xx.xxx.xxx Feb-2010 100.00% 15-02:10 477 15-02:10 270
5 109 dictionary attack
Now for an interesting question: how do we handle _distributed_ dictionary
attacks?
------------------------------------------------------------------------------
Download Intel® Parallel Studio Eval
Try the new software tools for yourself. Speed compiling, find bugs
proactively, and fine-tune applications for parallel performance.
See why Intel Parallel Studio got high marks during beta.
http://p.sf.net/sfu/intel-sw-dev
_______________________________________________
courier-users mailing list
[email protected]
Unsubscribe: https://lists.sourceforge.net/lists/listinfo/courier-users