Quote:
Originally Posted by reptiler
Wouldn't that equally apply to fail2ban?
I haven't worked with that yet, so I simply gotta ask.
|
Performing a login attempt requires packets to be sent back and forth. Doing so with a spoofed source address would be extremely difficult unless the target was, for example, using seriously
predictable TCP sequence numbers, which most modern OSes don't do. The attack on the
recent rules doesn't require any back and forth, therefore it's a different situation.