If you add a nat rule to port 443 (https), you do not need an explicit filter rule, but I do have it.
And if you have a filter rule, it must be before the rule that starts to block stuff.
and the last question i was playing around with your rules above,
I’ve noted something.
When i’m trying to get access from outsite with tarpit enabled, on the winbox i can see logging in and is gettign stack there. (the ip-add goes on blocked list)
If i disable tarpit and becouse of drop everythings else im seeying connecting to 1.2.3.4 (doesn’t know how to get there)
Lets say that you have a web server (443) and RDP (3389) open to all internett.
If some one with bad intention has a script that tests various ports, and if open ports are found trying to breake inn, this script for sure helps.
When the hackers script test port 10000 for any reason, he will be blocked for 24 hour on all ports, including 443 and 3389. Se his script can not try out anything to enter 443 or 3389, its blocked. Does not block a user trying only 443 or 3389.
You should not have 3389 open in any way (just as an example here).
that is absolutely clear.
What i was wandering is whether that behavior with the winbox (or any TCP connections, i have explained above ) is because of Tarpit job.
From what u have posted and from what i’m experiencing is completely match, can you confirm that. thanks
I do not use Winbox on outside. Not secure at all.
But to not look my self out I have a fixed white-list and a port knock that can add IP temporary to white-list.
When i’m trying to get access from outsite with tarpit enabled, on the winbox i can see logging in and is gettign stack there. (the ip-add goes on blocked list)
Are you not able to login? from where?
Do you get message that should not be there?
Are anything other broken?
im not able to log in , i can see only logging in…and it’s getting stuck there, doesn’t go further, with tarpit enabled
and according from the link:
When connections come in and are “tarpitted” they don’t go back out. The connection is accepted, but when data transfer begins to happen, the TCP window size is set to zero.
so , from what i’m experiencing is completely for expecting, am i right?
add action=jump chain=input comment=“Drop user that has tried ports that are not open and has bin added to block list. Limit TARPIT to prevent DDOS CPU problems” in-interface=ether1 jump-target=TARPIT protocol=tcp src-address-list=FW_Block_unkown_port
It will only hit when you are coming in on interface ether1 (outside) and are in the address list FW_Block_unkown_port
So:
You try to access router using winbox on outside interface???