Bruteforce protection - MikroTik firewall rules

Поделиться
HTML-код
  • Опубликовано: 1 фев 2025

Комментарии • 39

  • @laacis91
    @laacis91 2 года назад +2

    Shoutout to Druvis. Keep those videos coming, good stuff! 👍

  • @ForbiddenUser403
    @ForbiddenUser403 2 года назад +13

    What would be really nice, is if winbox connections could be secured with RSA keys just like SSH can be. You're not going to brute force a 4096 Bit RSA key... Password authentication is just bad practices. You already have the ability to authenticate connections to your router with RSA keys via SSH, extend that to support logins as Winbox as well.

    • @alexn4976
      @alexn4976 2 года назад

      Opening 22 port on WAN is a bad practice, do not do that. Even with RSA SSH attacker can DOS your router just overloading cpu. So RSA will not help you.

    • @stevebot
      @stevebot 2 года назад +1

      @@alexn4976 Port is irrelevant, an advanced attacker will eventually discover the ssh server and begin attack on that port. Being that advanced or determined, they most likely will also have multiple IPs available. I believe I have seen that happen, I picked out a pattern of usernames in the attempts that suggested they were the same dictionary, no randomization.

    • @alexn4976
      @alexn4976 2 года назад +1

      @@stevebot Do not open SSH on WAN, use VPN. Or if you still have to you can protect router with PSD.

  • @ipopovv
    @ipopovv 2 года назад +4

    May I buy the training materials only (e.g. that workbook)? Because I am interesting in learning not in certification

  • @ChrisNicholson
    @ChrisNicholson 2 года назад +2

    I wrote this a few years ago and called it 3 strikes. I used firewall jump. What I fell short on... Having the ability to remove an IP from the address list once you got in.

  • @alimibrahem8120
    @alimibrahem8120 2 года назад +2

    Very thanksful Eng Druivs for your explination, but a question to ask ..
    what is the meaning of not secured in third connection rule..?

  • @kirksteinklauber260
    @kirksteinklauber260 Год назад +1

    Any chance to add native support to CrowdSec community IPS? That will be awesome as well

  • @darksecrets874
    @darksecrets874 Год назад

    For some reason it doesn't work when ssh is enabled from the outside only when it's on the local area network

  • @netbootdisk
    @netbootdisk 2 года назад +4

    This is a bit of a hacky workaround. Surely it'd be better if you just added this this sort of functionality natively to RouterOS to begin with?

    • @ON3RVH
      @ON3RVH 2 года назад +1

      Even better would be to block SSH and mgmt from the outside by default.

    • @netbootdisk
      @netbootdisk 2 года назад +2

      @@ON3RVH Also should be built in bruteforce blocking for VPNs like l2tp/sstp etc

    • @RmFrZQ
      @RmFrZQ 2 года назад

      @@netbootdisk I'm pretty sure it could be done using MikroTik's native scripting. Still, it's better to use VPNs those support Public Key Certificates for authentication, e.g. OpenVPN, and forget about all XXtp ones.

  • @awakeningnow5376
    @awakeningnow5376 7 месяцев назад

    What happens if the attack comes from bot farms? Tens or hundreds unique IPs each second. Memory overflow?

  • @FinlayDaG33k
    @FinlayDaG33k 2 года назад +1

    I was looking at the intro like: "Why is he holding a probe lens?"... *visible worry*

  • @FlexibleToast
    @FlexibleToast 2 года назад +2

    You're essentially recreating the wheel that fail2ban already created.

    • @mikrotik
      @mikrotik  2 года назад +1

      You can do one thing in many ways, result is the same. Btw fail2ban was only released in 2004, but MikroTik RouterOS has these capabilities since the late 90s

  • @topprofil
    @topprofil Год назад

    Can these rules be used for Winbox port by simply adding it to the port list?

  • @aperson1181
    @aperson1181 Месяц назад

    How do you bring up the terminal to enter the code?

    • @RespiteFromReality
      @RespiteFromReality 22 дня назад

      There is a "New Terminal" button in the sidebar on the left in the WebGUI or WinBox app.

  • @christiansonnenberg6306
    @christiansonnenberg6306 2 года назад +1

    if you wanted to secure a device behind your Tik and wanted to make sure to not blacklist a legit user you could monitor if there was a connection open where more than the bytes need to authenticate yourself were exchanged!

  •  2 года назад +1

    Just some camera equipment…?! That's a probe lens which is not cheap! 😬

  • @inprosis
    @inprosis Год назад

    how can i block regaetton music

  • @CamKilton
    @CamKilton 2 года назад

    Allow for online courses rather than the current course structure.

  • @alialyemeni2024
    @alialyemeni2024 9 месяцев назад

    How to protect Mikrotik from attacks on connections

    • @mikrotik
      @mikrotik  9 месяцев назад +1

      explained in the video

    • @alialyemeni2024
      @alialyemeni2024 9 месяцев назад

      @@mikrotik
      Protection from IP depletion in Mikrotik

  • @ON3RVH
    @ON3RVH 2 года назад +2

    Never, EVER allow ssh or any mgmt or unsecure protocol on the outside of your network unless it comes from hosts that YOU manage and know for sure are secure. Otherwise use a mgmt subnet.

    • @mikrotik
      @mikrotik  2 года назад

      That’s a given! But sometimes you must open it from a local network, in those situations, better use multiple layers of security (see our other recent videos about that)

    • @ON3RVH
      @ON3RVH 2 года назад +2

      @@mikrotik I don't see any reason why you would have to open it from to internal network unless you trust that network. That is why you have a mgmt network or mgmt hosts.

  • @xuxamelo
    @xuxamelo Год назад

    post the manual please

  • @RmFrZQ
    @RmFrZQ 2 года назад

    This video is an ad for paid training courses. :(
    I use this technique only to toy with the attackers (human or not) and only "blacklist" them to build lists of rogue IPs.
    Everyone should disable password authentication for SSH and use Public Key authentication instead.

    • @mikrotik
      @mikrotik  2 года назад

      We have a video about that too, you must watch it as a series

    • @RmFrZQ
      @RmFrZQ 2 года назад

      @@mikrotik probably I've expected to learn something new in this video. I think it could be better, with more insight and recommendations, and also marked as "Basic" in the title. I hope you will make "advanced" videos about L2 routing protocols, policy-based routing tables, VLANs, advanced scripting, how and when to use advanced tools effectively, etc. About anything that requires setup of 3 or more MikroTik devices.

  • @wreckedzilla
    @wreckedzilla 2 года назад

    Dru best!

  • @m4d3ng
    @m4d3ng 2 года назад

    Poor man's fail2ban. Precede your last drop-all rule with a rule to add the src addr to a drop list. Deny that drop list from anything that you must have open, eg your secure VPN port(s).

    • @mikrotik
      @mikrotik  2 года назад

      Fail2Ban was created much later than this method but ok 🙂

  • @Anavllama
    @Anavllama Год назад +1

    The MT is not an edge router, it cannot handle such attacks. Dont waste your time. This is the job of your ISP and further up the food chain. Such configurations create bloatware on the config leading to config errors and difficulty troubleshooting. Focus on needed traffic! Drop all else. KISS