Cross-post!

  • @oDDmON
    link
    911 months ago

    Seeing “security companies” tagging VPN IP blocks as sus, is becoming all too common; just like ad blockers are being banned.

    They wanna know who you are, where you’ve been, what you’re doing and how you’re doing it…AT.ALL.TIMES.dammit!

    • Dran
      link
      611 months ago

      Context/region blocking is a very quick and inexpensive path to basic security. At work I have sets of iptables rules to block regions by country code and by context (i.e VPN provider, datacenter provider, etc). I’ve found that some services will go from tens of thousands of brute force attempts per day to 1-2 per month. It really is crazy the amount of routine attacks that come through VPN providers if you host services in the professional world.

      Does this mean that legitimate users can’t use a VPN to access our services? Yes, but we also don’t sell any data to any third parties so I don’t feel so bad about it.

      • @oDDmON
        link
        411 months ago

        In your case prevention of DDOS via VPN guides your decisions and legit VPN users are collateral damage.

        I understand your position, and as you say, no data is sold, so no real harm.

        Perhaps banks are the same way.

        But out of the ones I have to deal with, only one makes me drop the VPN for access. /smh