On 21 Oct 2024, at 20:37, Peter N. M. Hansteen <pe...@bsdly.net> wrote:
>> which begs the question, what to do you do to the ones that get thrown into 
>> the table?

So, I have a multi-layer strategy:

1. at the edge router all attempts at hitting well-known ports on the network 
and b/cast get added to the PF blocklist on the spot,
2. the edge router collects and collates the blocklists from my internal hosts 
and adds them, this is currently a pull but is about to become a push, and 
protects the whole network in one go,
3. the individual hosts have scripts to find SSH, Dovecot, Sendmail and Postfix 
brute-forcers, submitting to the edge router and their own PF blocklist as an 
extra measure,
4. a honeypot adds the rest but also allows me to play.

I have explicit bypasses for certain services I run which I want to be open to 
everyone no matter the IP (but not SSH, IMAP, etc.)

There is also an un-related OpenBSD httpd config which “block drop”s any and 
all invalid URLs so
I don’t worry about the logs being DoS’d.

That’s all folks,

Arrigo


_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to