Hi Gerald,
On Thu, May 10, 2012 at 06:17:31PM +0100, Gerald Davies wrote:
Are the attacks that I receive (a lot of
dictionary/brute force
attempts and proxy scans) part of someone/thing simply scanning a
range of Bitfolk IPs?
They are scanning the entire Internet.
Actually when I do investigations of compromised hosts that have
been engaging in SSH scanning, if I'm lucky enough to find a
.bash_history I often find that the tools used to do the scanning
are quite primitive and only accept IP ranges like:
x.y.z.*
x.y.*
i.e. not CIDR¹ notation. I often find they've done things like
./a 164.238
./a 62.76
./a 192.100
to scan against a few big blocks of addresses.
Would it not make sense to share this information or
is this too much effort?
Would the goal of this to be to block abusive hosts before they have
a few tries against your own host?
I can see a few tricky issues around the possibility of a bug,
mistake or hostile user injecting arbitrary IPs into the system
causing everyone to ban those IPs.
I can see how someone with multiple machines might want a site-wide
block list, but I'm not sure it is worth it for use by multiple
different admins. You'd have to put a lot of effort into securing
it. Seems easier to just protect yourself with the more conventional
ways.
Cheers,
Andy
¹
http://en.wikipedia.org/wiki/CIDR#Subnet_masks
--
http://bitfolk.com/ -- No-nonsense VPS hosting