TIP: Click on subject to list as thread! ANSI
echo: linux
to: ALEXEY VISSARIONOV
from: JOAQUIM HOMRIGHAUSEN
date: 2017-12-18 21:38:00
subject: Alternative(s) to ipset o

 av> Very dangerous thing... However, it makes some fun to use it
 av> against the admin^Widiot who installed it :-)

I'm curious ... why is fail2ban dangerous?

 av> Being a security expert, I know (and use; and, obviously,
 av> recommend) better method: limit the number of connections per
 av> minute to 2 or 3, thus making any and all bruteforce attacks
 av> time-ineffective.

I don't see why these are mutually exclusive ... but maybe I'm not an expert
enough. If you use key-only authentication for SSH (for example), it makes
perfect sense to add someone to a ban list for 15-600 minutes if they fail 3
times (for example).

I quite often legitimately connect with 2-3-4 SSH sessions to the same server
within a few minutes, but they don't fail of course :)



 -joho

---
* Origin: code.code.code (2:20/4609)

SOURCE: echomail via QWK@docsplace.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.