This one time, at band camp, Pierre Chifflier said:
> fail2ban generate rules for iptables matching only the port, for ex:
> -A INPUT -p tcp -m multiport --dports 22,115 -j fail2ban-ssh
> 
> This is bad, and can result in a nice DoS for NATed users if two users
> share the same IP, and one fails 3 times to login, then all
> connections (including already established) are banned.
> 
> Proposed solution: filter only SYN paquets, so that established
> connexions are not affected, only new (patch attached for
> iptables-multiport, same solution could be applied to other actions as
> well).

As Yaroslav says, this functionality is covered by iptables-new.conf.
Additionally, it's a bad idea in general.  It would be trivial to open
up a few hundred connections, and just keep banging away long after I'm
supposedly banned.  Judging by the amount of hits I get on my firewall
after banning someone, this is indeed what it looks like they do now, so
I recommend keeping the default.
-- 
 -----------------------------------------------------------------
|   ,''`.                                            Stephen Gran |
|  : :' :                                        [EMAIL PROTECTED] |
|  `. `'                        Debian user, admin, and developer |
|    `-                                     http://www.debian.org |
 -----------------------------------------------------------------



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to