Context/region blocking is a very quick and inexpensive path to basic security. At work I have sets of iptables rules to block regions by country code and by context (i.e VPN provider, datacenter provider, etc). I’ve found that some services will go from tens of thousands of brute force attempts per day to 1-2 per month. It really is crazy the amount of routine attacks that come through VPN providers if you host services in the professional world.
Does this mean that legitimate users can’t use a VPN to access our services? Yes, but we also don’t sell any data to any third parties so I don’t feel so bad about it.
Context/region blocking is a very quick and inexpensive path to basic security. At work I have sets of iptables rules to block regions by country code and by context (i.e VPN provider, datacenter provider, etc). I’ve found that some services will go from tens of thousands of brute force attempts per day to 1-2 per month. It really is crazy the amount of routine attacks that come through VPN providers if you host services in the professional world.
Does this mean that legitimate users can’t use a VPN to access our services? Yes, but we also don’t sell any data to any third parties so I don’t feel so bad about it.
In your case prevention of DDOS via VPN guides your decisions and legit VPN users are collateral damage.
I understand your position, and as you say, no data is sold, so no real harm.
Perhaps banks are the same way.
But out of the ones I have to deal with, only one makes me drop the VPN for access. /smh