Community discussions

MikroTik App
 
RackKing
Member
Member
Topic Author
Posts: 380
Joined: Wed Oct 09, 2013 1:59 pm

Why blacklist burteforcers VS just dropping the ports/service?

Wed Nov 21, 2018 4:17 pm

If you have drop rules that simply drop packets to ports/services you do not use like ssh, ftp, telnet, winbox, etc... what is the advantage to creating a timed black list and dropping that? Is it to gain the logs and perform further action?

If you have the IP/Services turned for all those is there any purpose for those rules? The last input drop rule would work on them anyway right if they were not previously allowed in.

Thanks for any clarification.
 
User avatar
mkx
Forum Guru
Forum Guru
Posts: 13060
Joined: Thu Mar 03, 2016 10:23 pm

Re: Why blacklist burteforcers VS just dropping the ports/service?

Wed Nov 21, 2018 4:36 pm

Assume you're running http service (NATed from some internal host), open for whole internet, ssh open only from select remote addresses and winbox denied from internet. In case of blacklisting, if a potential hacker tries winbox port and you add his address to black list, he will not be able to access even http service. So this makes kind of extra security layer by protecting http service from potentially malicious user.
 
ivicask
Member
Member
Posts: 439
Joined: Tue Jul 07, 2015 2:40 pm
Location: Croatia, Zagreb

Re: Why blacklist burteforcers VS just dropping the ports/service?

Wed Nov 21, 2018 5:28 pm

If you have drop rules that simply drop packets to ports/services you do not use like ssh, ftp, telnet, winbox, etc... what is the advantage to creating a timed black list and dropping that? Is it to gain the logs and perform further action?

If you have the IP/Services turned for all those is there any purpose for those rules? The last input drop rule would work on them anyway right if they were not previously allowed in.

Thanks for any clarification.
Point also is that they may probe your other ports and also make extra load on your line and router while doing so, by blocking them for certain time and add rule to drop them in raw filter prevents them from doing further attempts but also increases performance as they are droped in raw instead in regular filter.
 
User avatar
Steveocee
Forum Guru
Forum Guru
Posts: 1198
Joined: Tue Jul 21, 2015 10:09 pm
Location: UK
Contact:

Re: Why blacklist burteforcers VS just dropping the ports/service?

Wed Nov 21, 2018 5:46 pm

Pre-empting the worst is probably the best summary.
If they're poking at certain ports when they shouldn't then you probably don't want them poking at anything.
 
User avatar
mkx
Forum Guru
Forum Guru
Posts: 13060
Joined: Thu Mar 03, 2016 10:23 pm

Re: Why blacklist burteforcers VS just dropping the ports/service?

Wed Nov 21, 2018 6:30 pm

If you have drop rules that simply drop packets to ports/services you do not use like ssh, ftp, telnet, winbox, etc... what is the advantage to creating a timed black list and dropping that? Is it to gain the logs and perform further action?

If you have the IP/Services turned for all those is there any purpose for those rules? The last input drop rule would work on them anyway right if they were not previously allowed in.

Thanks for any clarification.
Point also is that they may probe your other ports and also make extra load on your line and router while doing so, by blocking them for certain time and add rule to drop them in raw filter prevents them from doing further attempts but also increases performance as they are droped in raw instead in regular filter.
I don't aggree with whole of this argument. If FW is set to drop traffic which is not allowed, it doesn't prevent attackers to try other ports and thus making extra load on DL portion of internet line, regardless of where these packets are dropped (raw or filter rules). There is, however, slightly lower load on router as additional probes are dropped early in raw rules.
 
whitbread
Member Candidate
Member Candidate
Posts: 119
Joined: Fri Nov 08, 2013 9:55 pm

Re: Why blacklist burteforcers VS just dropping the ports/service?

Wed Nov 21, 2018 6:46 pm

If some1 probes your router on unused well known ports you do not want him to be able to evaluate if an exploit is working on another used port. True - you can use blacklists for this either.
 
ivicask
Member
Member
Posts: 439
Joined: Tue Jul 07, 2015 2:40 pm
Location: Croatia, Zagreb

Re: Why blacklist burteforcers VS just dropping the ports/service?

Wed Nov 21, 2018 8:06 pm

If you have drop rules that simply drop packets to ports/services you do not use like ssh, ftp, telnet, winbox, etc... what is the advantage to creating a timed black list and dropping that? Is it to gain the logs and perform further action?

If you have the IP/Services turned for all those is there any purpose for those rules? The last input drop rule would work on them anyway right if they were not previously allowed in.

Thanks for any clarification.
Point also is that they may probe your other ports and also make extra load on your line and router while doing so, by blocking them for certain time and add rule to drop them in raw filter prevents them from doing further attempts but also increases performance as they are droped in raw instead in regular filter.
I don't aggree with whole of this argument. If FW is set to drop traffic which is not allowed, it doesn't prevent attackers to try other ports and thus making extra load on DL portion of internet line, regardless of where these packets are dropped (raw or filter rules). There is, however, slightly lower load on router as additional probes are dropped early in raw rules.
Yea but to explain better what i meant, if u just drop traffic in firewall, and they find some open port like RDC, FTP, whatever.They will attempt to further attacks on that port like try brute-force RDP login for God knows how many times which will increases incoming traffic and simple firewall load.
So by early blocking port scanners or doing some other Honeypot(Like blacklist ppl who attempt to connect to winbox port) your preventing them to discovery your other ports that may be open, and with it also you prevent any other attempts on those ports which does generate extra traffic.So in general you are making your router more secure, reduce CPU load, but also it may save you some bandwidth if your IP is interesting to attackers.

Please correct me if im wrong.
 
RackKing
Member
Member
Topic Author
Posts: 380
Joined: Wed Oct 09, 2013 1:59 pm

Re: Why blacklist burteforcers VS just dropping the ports/service?

Thu Nov 22, 2018 3:43 pm

Pre-empting the worst is probably the best summary.
If they're poking at certain ports when they shouldn't then you probably don't want them poking at anything.
This makes a great deal of sense to me - thanks.

Good discussion - thanks to all who responded.

Who is online

Users browsing this forum: ConnyMercier, sindy and 74 guests