SCIENTIFIC-LINUX-USERS Archives

October 2008

SCIENTIFIC-LINUX-USERS@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
John Summerfield <[log in to unmask]>
Reply To:
John Summerfield <[log in to unmask]>
Date:
Thu, 2 Oct 2008 09:12:10 +0800
Content-Type:
text/plain
Parts/Attachments:
text/plain (31 lines)
Harry Enke wrote:
> Hi,
> there is an easy configurable tool for preventing brute force attacks, 
> it's called "fail2ban". It sifts through logs for attacks on security 
> critical ports and blocks login attempts from ip-addresses which fail 
> too often in too short a timeframe (configurable).
> 
> http://www.fail2ban.org

Is this in error?
"Fail2ban scans log files like /var/log/pwdfail or 
/var/log/apache/error_log and bans IP that makes too many password 
failures. It updates firewall rules to reject the IP address."

Examining logs after the event does not provide real-time protection.


-- 

Cheers
John

-- spambait
[log in to unmask]  [log in to unmask]
-- Advice
http://webfoot.com/advice/email.top.php
http://www.catb.org/~esr/faqs/smart-questions.html
http://support.microsoft.com/kb/555375

You cannot reply off-list:-)

ATOM RSS1 RSS2