On Wed, 02 Dec 2015 09:06:01 +0000, venember wrote:
> 1. I only ask something. If you can not want to do/help, say simply no.
I am trying to help, and thank you, but the staff will police threads
around here - there’s no need for you to do that.
You don’t seem to understand that people are trying to help you, but
you want a cut-and-dried solution provided to you, and we don’t have
enough information to give you one.
That means those trying to help you need to ask questions, and are going
to provide solutions based on our current understanding of your need and
your environment.
> I am not the only user who uses the port.
That was not clear before.
> If somebody makes the thorough port scanning, he will find the ssh
> (ssh2!) port. The bruteforce is not a playground.
Generally, brute force attacks are not preceded by a port scan. Yes, if
you change the port, it can still be found, but for the bulk of brute
force attacks against SSH, in my experience, changing the port is one
effective tool to use.
Now, I’ve only been working with Linux since the late 90’s and with
computer networks since the 80’s, so it might be that I don’t know what
I’m talking about. I’m pretty sure I do know, though, and my experience
has borne that out.
> 2. I was using fail2ban with sophisticated homemade-tuned defense
> system. It was more than enough… till now, when the 13.2->Tumbleweed
> upgrade forced the journalling and syslog-ng and rsyslog are not worked.
> I could not check anything. But the error was resolved today morning and
> the firewall and working (but not logging) fail2ban was enough during
> this period.
So it sounds like your problem is resolved, then, and the solution that’s
been recommended solves your problem.
> 3. Besides I would say that I do not want to use polkit and any other
> commercial widespread defense, also auditing. Unfortunately erasing the
> polkit wipes out almost the whole desktop system.
This is puzzling to me - “I have a need, but I’m going to exclude
potential tools to solve the problem” isn’t a good approach to solving
problems. You wouldn’t want to fix a car engine without wrenches or a
socket set, would you? If you only tried to fix a car engine using a
hammer, you’re not going to do a good job of fixing the engine.
> I would like to hamper and punish the “bruteforcer”, my question was
> simply this. Waiting is killing.
The way that most effectively does this is to configure whatever’s
between the user and the service (the firewall, the router - which you
don’t have, so it doesn’t apply here) to not report the port as closed,
but simply to not respond to probe requests.
If the port doesn’t respond to the SYN request, then the application
that’s asking will wait until it times out, which can slow down probes.
Jim
–
Jim Henderson
openSUSE Forums Administrator
Forum Use Terms & Conditions at http://tinyurl.com/openSUSE-T-C