[GLLUG] Maybe OT - Fail2ban and what triggers it

Ken Smith kens at kensnet.org
Mon Mar 18 09:26:27 UTC 2013


Ken Smith
K-Net Technology
020 8651 5722

Andy Smith wrote:
> Hi Ken,
>
> On Mon, Mar 18, 2013 at 07:39:06AM +0000, Ken Smith wrote:
>    
>> {snip} modified one of its scripts so that it runs a
>> stealth nmap scan of the login fail's source.
>>      
> I wouldn't really advise doing this as many people don't appreciate
> being scanned with tools like nmap and it is probably a breach of
> the acceptable use policy of whatever network you are on to be doing
> that against masses of hosts that you don't have permission to do it
> to.
>
>    
Fair point. Mind you, they didn't ask me if I was happy to accept their 
connection attempts. Having collected some stats maybe I should revert 
my changes.
>> The majority of the failures IP addresses resolve to originate
>> behind the Great Firewall and most of the sources look like Linux
>> machines, often Ubuntu.
>>      
> Is it possible that you've seen only a statistical anomaly? The SSH
> dictionary attacks I see tend to be from all over the place, as
> likely to be from the ARIN region as the APNIC region.
>    
Possibly.
> {snip}
> Host that I see fall prey to SSH dictionary attacks are very often
> immediately put to use by the attacker in carrying out further SSH
> dictionary attacks, so it is not surprising to me that most of these
> attacks come from hosts that themselves run an sshd.
>    
Fair point too.
> Also bear in mind that just because you have an IP address does not
> mean that connecting back to that IP address allows you to reach the
> actual source of the attack. {snip}
>    
Indeed, who knows what is really been 'seen'
> Cheers,
> Andy
>
>    

-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.





More information about the GLLUG mailing list