banning, was Re: Non-user logins?
Dave McGuire
mcguire at neurotica.com
Sat Jan 8 22:23:38 UTC 2022
On 1/8/22 12:12 PM, John Fawcett wrote:
> On 08/01/2022 17:22, Dave McGuire wrote:
>> On 1/8/22 8:57 AM, John Fawcett wrote:
>>> yes, blocking on the first wrong password sounds like overkill. But
>>> it does depend on user base. For a small mail server with few known
>>> users it could be workable.
>>
>> It may be overkill for your network, but it's not overkill for mine.
>>
>>> But even on small servers I'd recommend blocking for a small time
>>> (like up to an hour) after a small number of failures (example 3).
>>> Then if this pattern repeats (for example 3 times) within a longer
>>> period (for example up to a day), blocking for a longer period
>>> (example 1 week) using the recidive jail.
>>
>> My mail server is a small one with about 135 users, a corporate
>> network. NONE of them actually type their password when they're
>> checking their mail. They type it exactly once when they set up the
>> account in their mail client(s), like everyone else in the world for
>> the past decade or more.
>>
>>> Mileage will vary depending on user base and number of support
>>> requests generated.
>>>
>>> The point about fail2ban is that it slows down attackers stopping
>>> infinite and fast repeating attacks from the same ip. That should be
>>> in combination with a good password policy which reduces the
>>> probability of any single attack guessing the password. It doesn't
>>> necessarily have to zero out attacks. As Dave has experimented, to
>>> bypass fail2ban all the attacker has to do is use a different ip.
>>> 10-15K blocks in place at any time seem very high compared to the few
>>> attacks I see.
>>
>> Sigh.
>>
>> I don't "experiment" with production networks. I set up a banning
>> policy that works for the attack patterns that I see in my logs, and
>> that work with my user base. As I explained to the other guy who
>> decided that how I run my network is wrong, I'm not new at this.
>>
>> Any attack mitigation strategy has to begin with observation and
>> rational thought. Network security is no place for guesswork or
>> assumptions.
>>
>>> I'd hazard a guess that the restrictive fail2ban policy is causing
>>> the attacker(s) to try immediately from a new ip and isn't generating
>>> a great deal more security than a slightly less restrictive policy
>>> which lures the attacker into trying a few times more from the same
>>> ip with longer intervals between the attempts.
>>
>> I wasn't asking for a critique of my configuration; I explained my
>> approach to a new user who came here looking for help.
>>
>> Which is the last time I'll do THAT on this list, by the way.
>>
>> But since you brought it up, the attack pattern that I see most
>> frequently is a single IP address trying different, obviously
>> algorithmically-generated usernames at long intervals, many seconds to
>> many hours, and in some cases a day or more. This started around 2014
>> or so, and has persisted and grown. The approach that you describe
>> above seems to make sense on the surface, but looking at actual logs
>> doesn't support the idea.
>>
>> The "attackers" in this case are almost exclusively little programs
>> thrown together by kids and run from zombie Windows boxes on clueless
>> users' home networks organized as botnets. This pattern is visible
>> when the same sequences of generated usernames start appearing from
>> different IP addresses within hours of each other.
>>
>> Some of the more advanced stuff has the adaptive behaviors that you
>> describe, but not many. These script k1ddiez are trolling for
>> low-hanging fruit to get bank account info etc out of peoples' mail
>> accounts. These are almost never focused attacks from one motivated,
>> knowledgeable person trying hard to get into one user's mail.
>>
>> So, hazard all the guesses you like, I will continue to develop
>> banning strategies for my servers which fit the attacks that I observe
>> through direct analysis of my logs.
>>
>> Now, please don't misunderstand, I actually do appreciate the
>> thought and intention behind your unsolicited advice. But, for future
>> reference, don't assume that someone doesn't know what they're doing
>> just because their approach differs from either your approach for your
>> own network, or your guesses about theirs.
>>
>> -Dave, pre-coffee
>>
> Dave
>
> no one is telling you how to run your server or offering you unsolicited
> advice but on a public mailing list there can be multiple points of view
> about a topic and there may be not be a single right way to do
> something. There is no reason then to take this as someone telling you
> that how you run your network is wrong or to avoid participating in future.
Well thanks for that, but perhaps you should re-read what you sent
that prompted my (admittedly rather sour) reply.
-Dave
--
Dave McGuire, AK4HZ
New Kensington, PA
More information about the dovecot
mailing list