Displaying 20 results from an estimated 4000 matches similar to: "limiting number of incorrect logins per connection"
2020 Jun 21
6
firewall questions
I'm running Centos 7.8.2003, with firewalld.
I was getting huge numbers of ssh attempts per day from a few specific
ip blocks.
The offenders are 45.0.0.0/24, 49.0.0.0/24, 51.0.0.0/24, 111.0.0.0/24
and 118.0.0.0/24, and they amounted to a multiple thousands of attempts
per day. I installed and configured fail2ban, but still saw a lot of
attempts in the logs, and the ipset created was
2018 Aug 09
2
Best practices for backing up small mailserver to remote location
On 8/7/2018 5:08 PM, Adi Pircalabu wrote:
> - Since you're on dynamic IP at home, set up a VPN tunnel using the
> mailserver as server and HTPC as client. OpenVPN is ubiquitous and
> widely supported.
> - rsync your mailboxes using the tunnel connection.
> This way you can back up your entire server, not only the mailboxes.
Instead of openvpn, I use openssh. Use compression
2017 Aug 17
3
Detecting DoS attacks via SIP
Well, correct me if I'm wrong, but I would say this conversation you have
posted is a bit outdated, now fail2ban can be used with asterisk security
log
https://wiki.asterisk.org/wiki/display/AST/Asterisk+Security+Event+Logger.
On Thu, Aug 17, 2017, 4:53 AM Telium Technical Support <support at telium.ca>
wrote:
> Keep in mind that the attacks you are seeing in the log are ONLY the
2017 Aug 15
6
Detecting DoS attacks via SIP
Hi all,
Lately, I've seen an increase in the number of attacks against my system from the so-called "Friendly Scanner." When one of these script kiddies targets my server, all I see for symptoms is a few of my trunks become lagged due to server load and a stream of messages on the console that resemble this:
[Aug 2 20:27:50] == Using SIP VIDEO CoS mark 6
[Aug 2 20:27:50] ==
2018 Jan 02
2
SIP invite timeouts : how is someone sending invites from our server ??
On 12/30/2017 08:18 PM, Dovid Bender wrote:
> Script kiddies trying to find vulnerable systems that they can make
> calls on. Lock down the box with iptables and use fail2ban to block
> them. The via is probably bogus unless a box at the DoD was comprimised.
>
>
>
> On Sat, Dec 30, 2017 at 6:49 PM, sean darcy <seandarcy2 at gmail.com
> <mailto:seandarcy2 at
2011 Aug 31
9
Centos VPS Kernel 2.6.35.4 & 'string-less' IP tables
On a VPS I wanted to add to IP tables:-
iptables -A XXXX -p tcp -m string --algo bm --string 'login' -j DROP
I got:
iptables: Unknown error 18446744073709551615
uname -a = 2.6.35.4 #2 (don't know how this got installed)
lsmod | grep ipt = ipt_LOG 5419 2
yum upgrade iptables* = nothing to install.
---------------------------------------
On a standalone server (C 5.6)
2008 Jul 21
20
Ideas for stopping ssh brute force attacks
just wanted to get some feedback from the community. Over the last few
days I have noticed my web server and email box have attempted to ssh'd to
using weird names like admin,appuser,nobody,etc.... None of these are
valid users. I know that I can block sshd all together with iptables but
that will not work for us. I did a little research on google and found
programs like sshguard and
2017 Dec 30
4
SIP invite timeouts : how is someone sending invites from our server ??
I've been getting a lot of timeouts on non-critical invite transactions.
I turned on sip debug. They were the result of SIP invites like this:
Retransmitting #10 (NAT) to 185.107.94.10:13057:
SIP/2.0 401 Unauthorized
Via: SIP/2.0/UDP
215.45.145.211:5060;branch=z9hG4bK-524287-1---zg4cfkl50hpwpv4p;received=185.107.94.10;rport=13057
From:
2020 Jan 09
7
Blocking attacks from a range of IP addresses
I am being attacked by an entire subnet where the first two parts of the IP address remain identical but the last two parts vary sufficiently that it is not caught by fail2ban since the attempts do not meet the cut-off of a certain number of attempts within the given time.
Has anyone created a fail2ban filter for this type of attack? As of right now, I have manually banned a range of IP addresses
2008 Jan 01
6
Delay on failed pw attempts
Hi,
Is there a way, or can a way be added, to add an "auth_failed_delay=10s"
style option that would put in an artificial delay after a failed
password attempt?
As it stands now, Dovecot seems highly vulnerable to widescale
brute-force password dictionary scans.
Even if it's not configurable, can a delay be hardcoded to something
like, say, 10 or 15 seconds?
--
Dean Brooks
dean
2023 Mar 18
4
Minimize sshd log clutter/spam from unauthenticated connections
Dear OpenSSH developers,
a publicly accessible sshd on port 22 generates a lot of log clutter
from unauthenticated connections. For an exemplary host on a university
network, sshd accumulates 5~20k log lines on a single day (more than 90%
of the total amount of syslog lines). That is despite the host having a
restricted configuration (no SSH password authentication, firewall rate
limit for
2010 Aug 30
1
Fail2ban integration issues with Asterisk 1.4.21 under Debian Lenny
Hi,
I've recently had a fairly prolonged SIP registration attack, 18 hours in
this case and often with 200 attempts per second, and suspect I've had a
number of these in the past. The main symptom I noticed previously was,
because Asterisk was responding to each registration request it received,
it was very quickly using up my 448 kbps upload limit for my home ADSL
connection: any
2011 Apr 27
2
Asterisk, SIP & Firewalls
Hi all,
I'm trying to get my head around our Asterisk network configuration.
We've been using it for about 2 years now (home office) and it works
great. Its Asterisk 1.4.2 with SIP through external provider(s).
We have the Asterisk server behind our IPCop firewall, and have a
dedicated IP address that comes to the firewall from our ISP (Cox) and
that is routed to our Asterisk box
2010 May 24
7
[WTA] Automatically blocking on failed login
Hello All,
I had problems with the security server, the server is frequently
attacked using bruteforce attacks. Is there an application that can
perform automatic blocking when there are failed login to the ports
smtp, pop3 port, and others?
I am currently using CentOS 5.5 in some servers
Thanks in advanced.......
--
--
Best regards,
David
http://blog.pnyet.web.id
-------------- next part
2018 Aug 07
3
Best practices for backing up small mailserver to remote location
My webserver also houses our mailserver. There's about six users on that
mail system and I'm thinking it would be good to back up the mailboxes to
my always on HTPC computer at home, which is reachable via a dynamic IP
service.
I know (or think) I need to use doveadm-backup for this but rather than
reinvent the wheel (or use the wrong wheel altogether) I'm wondering if
anyone can
2011 Apr 04
6
sshd: Authentication Failures: 137 Time(s)
Hi,
to prevent scripted dictionary attacks to sshd
I applied those iptables rules:
-A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -m recent
--update --seconds 60 --hitcount 4 --name SSH --rsource -j DROP
-A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -m recent --set
--name SSH --rsource
And this is part of logwatch:
sshd:
Authentication Failures:
unknown
2008 Jul 23
1
fail2ban needs shorewall?
I want to try out fail2ban and notice that both, kbs-CentOS-Testing and
ATrpms, have shorewall as a dependency. I do not use shorewall and have
never used it. I have my own iptables/firewall script and am happy with
it. Can I install shorewall without any ill effects to my current sue of
iptables or would I need to use shorewall for firewalling from that point
on? (It may be a good product,
2010 Apr 10
10
Being attacked by an Amazon EC2 ...
Just a "heads-up" ... my home asterisk server is being flooded by someone
from IP 184.73.17.150 which is an Amazon EC2 instance by the looks of it -
they're trying to send SIP subscribes to one account - and they're
flooding the requests in - it's averaging some 600Kbits/sec of incoming
UDP data or about 200 a second )-:
This is much worse than anything else I've
2020 Jan 09
1
Blocking attacks from a range of IP addresses
I have experience block DDoS atacks. Contac White me in prived. If you have
intereses.
El mi?., 8 ene. 2020 8:45 p. m., Keith Christian <keith1christian at gmail.com>
escribi?:
> On Wed, Jan 8, 2020 at 5:37 PM H <agents at meddatainc.com> wrote:
>
> > I am being attacked by an entire subnet where the first two parts of the
> > IP address remain identical but the
2012 Jun 15
1
Update on spam, postfix, fail2ban, centos 6
I have been using centos 6 in a virtualized system for a few months now.
Took a while to batten down the hatches with postfix, rbls, and to use
fail2ban correctly.
The mailserver for my website(s) are located on the http server as
well..an 'all in one' server.
DNS servers are separated.
My two sites, and their emails addresses (1 for each) have been around
for 10 and 15 years