<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTP Brute Force Attempt vulnerability protection in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ftp-brute-force-attempt-vulnerability-protection/m-p/18814#M13700</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sounds like a bug. Have you opened a support case for this? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 01 Jul 2010 14:59:19 GMT</pubDate>
    <dc:creator>fredallee</dc:creator>
    <dc:date>2010-07-01T14:59:19Z</dc:date>
    <item>
      <title>FTP Brute Force Attempt vulnerability protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ftp-brute-force-attempt-vulnerability-protection/m-p/18811#M13697</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I enabled "FTP Brute Force Attempt" (ID 40001) vulnerability protection, but my FTP server logs are still filling up with unsuccessful brute force login attempts. I've tried "drop", "drop-all-packets", and "reset-both" but it doesn't seem to make any difference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, last night's ftp server log shows 810 unsuccessful login attempts within a time period of 10 minutes, but the PA only shows 7 brute force attempts&amp;nbsp; (action = reset-both) in that same time frame. Shouldn't it block the vast majority of brute force logon attempts?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jun 2010 15:12:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ftp-brute-force-attempt-vulnerability-protection/m-p/18811#M13697</guid>
      <dc:creator>dbaumann</dc:creator>
      <dc:date>2010-06-30T15:12:47Z</dc:date>
    </item>
    <item>
      <title>Re: FTP Brute Force Attempt vulnerability protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ftp-brute-force-attempt-vulnerability-protection/m-p/18812#M13698</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is how the PAN OS classifies a brute force attempt:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;If a session has same source and same destination but trigger our child signature, 40000, 10 times in 60 seconds, we call it is a brute force attack.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1367"&gt;https://live.paloaltonetworks.com/docs/DOC-1367&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Jul 2010 13:32:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ftp-brute-force-attempt-vulnerability-protection/m-p/18812#M13698</guid>
      <dc:creator>mharding</dc:creator>
      <dc:date>2010-07-01T13:32:54Z</dc:date>
    </item>
    <item>
      <title>Re: FTP Brute Force Attempt vulnerability protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ftp-brute-force-attempt-vulnerability-protection/m-p/18813#M13699</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Within in the first 60 seconds the ftp log shows 38 unsuccessful login attempts from the same source. The entire brute force attack lasted 10 minutes, with 810 unsuccessful login attempts showing up in the ftp log.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to the PAN OS classification shouldn't there be no more than 10 unsuccessful login attempts considering the conditions for a brute force attack were met?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Jul 2010 14:34:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ftp-brute-force-attempt-vulnerability-protection/m-p/18813#M13699</guid>
      <dc:creator>dbaumann</dc:creator>
      <dc:date>2010-07-01T14:34:51Z</dc:date>
    </item>
    <item>
      <title>Re: FTP Brute Force Attempt vulnerability protection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ftp-brute-force-attempt-vulnerability-protection/m-p/18814#M13700</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sounds like a bug. Have you opened a support case for this? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Jul 2010 14:59:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ftp-brute-force-attempt-vulnerability-protection/m-p/18814#M13700</guid>
      <dc:creator>fredallee</dc:creator>
      <dc:date>2010-07-01T14:59:19Z</dc:date>
    </item>
  </channel>
</rss>

