[asterisk-users] A new hack?

Steve Edwards asterisk.org at sedwards.com
Mon Dec 5 20:51:24 CST 2011


(This horse just won't stay dead...)

My apologies if I mis-attribute who wrote what.

> On Fri, Dec 2, 2011 at 11:35 AM, Jim Lucas <lists at cmsws.com> wrote:

>> How is using Fail2Ban less resource intensive then me writing (by hand) 
>> iptable rules?

On Mon, 5 Dec 2011, C F wrote:

> Sorry I wasnt very clear in my first writing, I'll try to clarify. Using 
> iptables only detects one type of attack (aggressive connections). While 
> his machines might be secure enough to allow any other attacks and still 
> not compromise his machine, iptables will still allow them thru and 
> therefore the attack will be using his bandwidth/resources, with f2b one 
> can add as many rules as/when they arrive.

I think you are over-generalizing.

You can write iptables rules to detect and respond to many types of 
attacks.

Since F2B is just an automated front end to iptables you can have as many 
rules as you need with or without F2B. Also, since packets are 'stopped' 
at the same place (iptables) any bandwidth savings would only be to 
services that you are running that either aren't or can't* be nailed down.

>> Also, since both methods involve the use of iptables, where exactly is 
>> the bandwidth savings?

> In detection.

How about 'in responding to an attack your iptables rules don't already 
mitigate and you do have F2B rules defined for?' 'Detecting' an attack 
means close to nothing if you don't respond to it :)

I'm not hating on F2B, it's just not a silver bullet nor is it appropriate 
for all environments.

Your security needs depends on your environment. At this point in time, 
all of the hosts I manage for my clients exist in very limited 
environments and have very small attack surfaces. They are racked in 
secure data centers. They only accept SIP from clients with static IP 
addresses that we have an existing business relationship with. They only 
accept SSH connections from me. They only accept HTTP connections from me 
and my boss. That's about it. I don't see where F2B adds much value for 
me.

*) Lots of admins think they can't limit access to servers because they 
have 'mobile' users. Your users probably don't need to access your servers 
from every single place on the Internet. If your users don't come from 
China, North Korea, Iran, etc, you can block entire regions with a few 
rules and eliminate 80% of probes and attacks from reaching your servers 
in the first place. Apologies in advance if you happen to live in some of 
these regions -- feel free to `s/China, North Korea, Iran/United States, 
Canada, England/g`

-- 
Thanks in advance,
-------------------------------------------------------------------------
Steve Edwards       sedwards at sedwards.com      Voice: +1-760-468-3867 PST
Newline                                              Fax: +1-760-731-3000



More information about the asterisk-users mailing list