sks-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Sks-devel] Annoying malicious keys - any easy solution?


From: Todd Fleisher
Subject: Re: [Sks-devel] Annoying malicious keys - any easy solution?
Date: Sun, 17 Feb 2019 08:02:07 -0800

Do you (or others) see are any side effects to this approach? I’m particularly 
wondering if it would cause your server to fall behind if it repeatedly closes 
connections from its peers.

-T

> On Feb 17, 2019, at 3:00 AM, Andreas Puls <address@hidden> wrote:
> 
> 
> 
> Am 17.02.2019 um 11:54 schrieb Gabor Kiss:
>>> So, what can I do?
>>> I know ths patch (which seems to be included in debian sks package) to
>>> ignore one special malicious key, but that seems to not help about those
>>> noted above. Is there a patch to add more keys to be ignored?
>>> As some IPs requests the same KeyID over and over again (>100 reqs/day),
>>> I do block those IPs with fail2ban.
>> 
>> Fail2Ban is useful but I intentionally do not log where the requests
>> come. Logging in the proxy is turned off.
>> 
> 
> I'm using nginx as reverse proxy and added this to the config:
> if ( $args ~
> "op=get&options=mr&search=(0x1013D73FECAC918A0A25823986CE877469D2EAD9|0x2016349F5BC6F49340FCCAF99F9169F4B33B4659|0xB33B4659|0x69D2EAD9)"
> ) {
>       return 444;
> }
> 
> 444: Connection Closed Without Response
> 
> Additonal i use fail2ban which triggers on the errorcode 444
>> Gabor
> 
> Br
>  Andreas
>> 
>> _______________________________________________
>> Sks-devel mailing list
>> address@hidden
>> https://lists.nongnu.org/mailman/listinfo/sks-devel
>> 
> 
> _______________________________________________
> Sks-devel mailing list
> address@hidden
> https://lists.nongnu.org/mailman/listinfo/sks-devel
> 

Attachment: signature.asc
Description: Message signed with OpenPGP


reply via email to

[Prev in Thread] Current Thread [Next in Thread]