fail2ban + dns = failTrackbacks
Trackback specific URI for this entry
No Trackbacks
Comments
Display comments as
(Linear | Threaded)
I guess I should take all the blame for this:
commit 042e160eeb3d7a09b0bb8dcda92f284bc3889f1d Author: lostcontrol Date: Wed Aug 8 22:21:15 2007 +0000 - Added filter file for named (bind9). Thanks to Yaroslav Halchenko But I wonder why for "bad ... idea why this filter is shipped in a default fail2ban installation" I see no new bug report among http://bugs.debian.org/cgi-bin/pkgreport.cgi?archive=both;src=fail2ban;submitter=nion%40debian.org This one indeed should be highly unadvised (and removed from jails.conf shipped with Debian) unless ignoreip can cover the range of valuable not-to-DoS for sure IPs ... or may be there is another precaution (matching incoming IPs based on interfaces on gateways etc) you have in mind? anyways, awaiting for a bug report P.S. I still consider 'rm' to be the most dangerous command of all times... god bless zsh and its protective powers
excuse my lazyness, I was too lazy to report this as a bug. Imho the whole fail2ban package should ship with a big fat warning for unexperienced users. anyway, I filed one now.
@zsh, I do agree Even though I once rmed my /etc when trying to show the zsh asking for the deletion and I missed that it only does on /etc/*
"for unexperienced users" I bet noone really would run a serious targetted DoS attack, but some automated script junkies looking looking for easy targets and doing dictionary attacks. And that is where (and thus for whom) fail2ban shines. DNS issue though is a bit closer to the reality of admins, and they better be experienced, and if they are not, such DoS would be the gentle lesson... may be I should advocate it as an educational tool then
but point is taken -- I might add some warning (thought about it myself as well)
yes i agree on that though in the case of dns providing a filter for udp really doesn't make sense not saying fail2ban sucks, i'm using it as well for some special purposes
What do you think about syslog lines like theses (counted by logwatch in a single day):
client 62.141.52.x query (cache) 'isc.org/ANY/IN' denied: 3438 Time(s) client 62.141.60.x query (cache) 'isc.org/ANY/IN' denied: 5414 Time(s) client 63.223.80.x query (cache) 'isc.org/ANY/IN' denied: 3847 Time(s) client 76.73.68.x query (cache) 'isc.org/ANY/IN' denied: 3541 Time(s) client 82.165.131.x query (cache) 'isc.org/ANY/IN' denied: 1006 Time(s) client 84.19.180.x query (cache) 'isc.org/ANY/IN' denied: 1342 Time(s) client 84.19.190.x query (cache) 'isc.org/ANY/IN' denied: 1639 Time(s) client 87.106.177.x query (cache) 'isc.org/ANY/IN' denied: 2366 Time(s) Doesn't someone is trying to use my DNS to DDOS someone? Add Comment
|
Calendar
QuicksearchSupportRecent Entries
CategoriesTag cloud23c3 acpi advertising annouce announce april argh art awards bash blogging bugs c cli code conferences config configuration data mining debconf debian dell dns documentation email errm? events exploit fail fail2ban filesharing films flame fun gcc google graphs grml gsm hacking hacks hardware heise images information installation internet irc knowledge libacpi links linux mobile phones network news newsbeuter omg open source opera passwords php power privacy programming qa random blurb rant release releases rss scripts security service setup shell sms software spam ssh stfl stuff terminal tests text mode tip tips tools troubleshooting unix user video vim.editing web web 2.0 websites wordpress wtf www youtube zsh
|