Hello all,

My I add my 2 cents ...

I had the same problematic some months ago, so I develop log2table (
http://vincentdelft.be/post/post_20170517)
Which has the same idea of fail2ban.
It's a python script with no specific requirements, except some entries in
doas.conf.

The added value is that you can ban a bad IP based on the different actions
he is doing on your machine (ssh, http, ...).
In short, every attack gives a "weight" (you decide in the config file) and
when the threshold is reached the IP is blocked (1 hour in my config).

rgds


On Mon, Oct 30, 2017 at 10:31 AM, Kamil Cholewiński <harry6...@gmail.com>
wrote:

> On Mon, 30 Oct 2017, Gregory Edigarov <ediga...@qarea.com> wrote:
> > On 29.10.17 03:20, x9p wrote:
> >>
> >> Coming from the Linux world, I wonder if there is a better alternative
> >> to fail2ban, already being used in OpenBSD servers by the majority.
> >>
> > I suggest you NEVER use such "solutions". It's security by obscurity
> > model, and therefore a bad very very bad thing.
> > You'd be much safer completely turning off password authentication,
> > using keys instead.
>
> Throttling brute-force attack attempts is usually Good. Passwords are
> one thing to try forcing, but there may be other undiscovered (or
> unpatched) vulns, like the Debian key fiasco or such.
>
> Of course, if it actually made sense, OpenBSD would probably ship it as
> a default ;)
>
> <3,K.
>
>

Reply via email to