On 03/13/2006, johannes weiß wrote:

> this is the std config. But it's widely configurable (e.g.:
> --- SNIP (fail2ban.conf, std config) ---
> fwban = iptables -I fail2ban-%(__name__)s 1 -s <ip> -j DROP
> fwunban = iptables -D fail2ban-%(__name__)s -s <ip> -j DROP
> maxfailures = 5
> bantime = 600
> findtime = 600
> --- SNAP ---
> 
> 
>> to iptables whenever 1.2.3.4/32 has too many login failures?
>>   
> 
> 
> it executes "fwban" if an IP has more than "maxfailures" failures in 
> "findtime". This ban will be removed after "bantime" seconds.
> Also configurable:
> - Mail sending
> - Apache (htaccess) checks
> - I'm pretty sure that also other auth-log-files could be parsed(by regexp) 
> if you want to.
> 
> 
>> Does it expire entries?
>>   
> 
> 
> (yes after "bantime" seconds)

Here's a recent entry from /var/log/fail2ban.log:

2006-03-13 12:57:55,516 INFO: SSH: 161.45.164.113 has 6 login
failure(s). Banned.
2006-03-13 12:57:55,532 WARNING: SSH: Ban 161.45.164.113
2006-03-13 13:07:55,742 WARNING: SSH: Unban 161.45.164.113

Search for fail2ban or ssh brute force attacks on debian-user for more
discussions on the subject.

Regards,
Ralph


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to