I have a filter ready to do this, I have been using it for a couple of
years now. It requires the SNORT ids configured on the system, using syslog
output. Works like a charm.


On Tue, Jan 5, 2016 at 11:09 AM, Alex <mysqlstud...@gmail.com> wrote:

> Hi,
>
> On Mon, Jan 4, 2016 at 9:53 PM, Perry E. Metzger <pe...@piermont.com>
> wrote:
> > On Mon, 4 Jan 2016 20:56:41 -0500 Alex <mysqlstud...@gmail.com> wrote:
> >> That IP doesn't exist. I can't think of any reason a legitimate
> >> attempt would be made to communicate with that address,
> >
> > Lots of research and legitimate security projects use zmap to probe
> > the whole net. There are loads of legitimate reasons for scanning the
> > net, such as assessing what fraction of machines are running which
> > operating systems or software, or to learn about populations of
> > certain kinds of certificates. There are very important outputs from
> > such research that help everyone -- for example, decisions on
> > whether browsers can obsolete SHA-1 based certificates depend
> > critically on doing surveys of how many such certs are out in the
> > field, and decisions on whether support for old software can be
> > deprecated depends crucially on population surveys.
> >
> > It is best to distinguish between malicious scans and
> > legitimate ones. A malicious scanner inevitably follows up with
> > attempts to brute force things and one wants to ban *then*. Mere
> > scanning is often quite legitimate activity. Generally I try to ban
> > only activity that is actually clearly malicious, like brute forcing
> > ssh passwords or trying to send spam.
>
> I agree with what you've said from the perspective of a security
> professional and a "good Internet neighbor". However, we have a
> default-deny policy on our firewall. I just can't leave ports/hosts
> open for remote users to probe and investigate as they wish for
> non-existent hosts.
>
> Thanks,
> Alex
>
>
> >
> > Perry
> > --
> > Perry E. Metzger                pe...@piermont.com
>
>
> ------------------------------------------------------------------------------
> _______________________________________________
> Fail2ban-users mailing list
> Fail2ban-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/fail2ban-users
>
------------------------------------------------------------------------------
_______________________________________________
Fail2ban-users mailing list
Fail2ban-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/fail2ban-users

Reply via email to