TIP: Click on subject to list as thread! ANSI
echo: linux
to: JOAQUIM HOMRIGHAUSEN
from: ALEXEY VISSARIONOV
date: 2017-12-19 06:57:00
subject: Alternative(s) to ipset o

Good ${greeting_time}, Joaquim!

18 Dec 2017 21:40:18, you wrote to me:

 av>> Very dangerous thing... However, it makes some fun to
 av>> use it against the admin^Widiot who installed it :-)
      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
 JH> I'm curious ... why is fail2ban dangerous?

Didn't you read the message before answering it?

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5642
and some others discovered since that.

 av>> Being a security expert, I know (and use; and, obviously,
 av>> recommend) better method: limit the number of connections per
 av>> minute to 2 or 3, thus making any and all bruteforce attacks
 av>> time-ineffective.
 JH> I don't see why these are mutually exclusive ... but maybe I'm
 JH> not an expert enough. If you use key-only authentication for SSH

Don't you?

 JH> (for example), it makes perfect sense to add someone to a ban
 JH> list for 15-600 minutes if they fail 3 times (for example).

Now imagine someone had tricked your funny stupid fail2ban to ban _you_...

 JH> I quite often legitimately connect with 2-3-4 SSH sessions to the
 JH> same server within a few minutes, but they don't fail of course :)

I guess you simply don't know about screen.


--
Alexey V. Vissarionov aka Gremlin from Kremlin
gremlin.ru!gremlin; +vii-cmiii-cmlxxvii-mmxlviii

... :wq!
--- /bin/vi
* Origin: http://openwall.com/Owl (2:5020/545)

SOURCE: echomail via QWK@docsplace.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.