A32 wrote:
hotgazpacho wrote:
mail server would be under less load
Yes. Exactly. We also have to mention iptables filtering, web script vulnerability scans, sshd bruting, FTP bruting, DNS exploit attempts, port scans and all the logs that come with it. It's just unnecessary garbage we have to deal with and we all know where most of it comes from.
A lot of the brute force attempts can be thwarted by using high ports.
I was getting constant ssh brute attempts when first set up.
I did not use iptables to deal with it, the brute force detection solutions that add to your iptables really grow your iptables fast.
I used pam_abl to deal with it - and changed the port number.
pam_abl is a PAM module that creates a bdb database of failed attempts, and when too many - it then refuses to authenticate attempts from that user@host or that host even if they do get the right password. The beauty of it is that it doesn't gum up your iptables.
I also changed to a port > 1024.
Most kitties don't even bother scanning for an sshd running on a non standard port, and even fewer will scan for ports above 1024.
Run sshd on a port > 1024 and you'll find brute force ssh attempts virtually disappear completely.
With respect to ftp - I can't help you there, but the only way I ever would run an ftp server would be anonymous only, so brute force attempts would fail because no one could log in except for anonymous.
As far as DNS goes, I can't help you there either, I don't do my own DNS and have no desire to.