Re: sucessor for denyhosts?

2019-03-09 Thread Håkon Alstadheim
n-vpn. MJ On 3/9/19 9:57 AM, Hans wrote: Hi folks, looks like "denyhosts" is nol more in the repos. I like this tool, because it blocks the IP, when the wrong password is sent n-times. The blocked IP is added into /etc/hosts.deny, which IMO is a great idea. I am using a script,

Re: sucessor for denyhosts?

2019-03-09 Thread Roger Price
On Sat, 9 Mar 2019, mj wrote: We are using fail2ban to do this. It offers many more options, and works by creating iptables rules. This gives you much more control over what ports exactly are blocked. Plus I think (correct me if Im wrong) that using /etc/hosts.deny to block access only work

Re: sucessor for denyhosts?

2019-03-09 Thread Hans
Am Samstag, 9. März 2019, 11:22:45 CET schrieb mj: Hi MJ, that is a good point, that only services are blocked, which are using hosts.deny. For the other ports I am using tools like porstentry and hostentry, which are running well and do a good job. My personal style is strange: I am looking,

Re: sucessor for denyhosts?

2019-03-09 Thread mj
compiled to do so, and iptables will always work. MJ On 3/9/19 9:57 AM, Hans wrote: Hi folks, looks like "denyhosts" is nol more in the repos. I like this tool, because it blocks the IP, when the wrong password is sent n-times. The blocked IP is added into /etc/hosts.deny, whic

Re: sucessor for denyhosts?

2019-03-09 Thread Hans
interesting than sshguard. I wonder, why denyhots is being deleted from the repo. Ok, there were security issues in the past, but these are fixed now. And ok, it does not support IPV6, but I think, most private users might not used it. For the moment I will stay with denyhosts, but fail2ban is

Re: sucessor for denyhosts?

2019-03-09 Thread Paul Sutton
On 09/03/2019 08:57, Hans wrote: > Hi folks, > > looks like "denyhosts" is nol more in the repos. I like this tool, because it > blocks the IP, when the wrong password is sent n-times. > > The blocked IP is added into /etc/hosts.deny, which IMO is a great idea. &g

sucessor for denyhosts?

2019-03-09 Thread Hans
Hi folks, looks like "denyhosts" is nol more in the repos. I like this tool, because it blocks the IP, when the wrong password is sent n-times. The blocked IP is added into /etc/hosts.deny, which IMO is a great idea. I am using a script, which, cleares the hosts.deny after a certain

Re: DenyHosts

2016-01-17 Thread Bob Holtzman
On Sun, Jan 17, 2016 at 03:33:05PM +0200, Moreanu Robert - Nicolae wrote: > hi, > i'm looking to resolve this problem when I want to install debian 8.2 or > 8.1. I receive this message after it's take to Grub install > > " the 'grub-pc' package failed to install into /target/ " > after the operati

Re: DenyHosts

2016-01-17 Thread Moreanu Robert - Nicolae
hi, i'm looking to resolve this problem when I want to install debian 8.2 or 8.1. I receive this message after it's take to Grub install " the 'grub-pc' package failed to install into /target/ " after the operation of clean up on installing, i have a failed operations. I don't have such expertise

Re: DenyHosts

2016-01-17 Thread Igor Cicimov
On 18/01/2016 12:08 AM, "Christian Seiler" wrote: > > On 01/16/2016 10:57 AM, Reco wrote: > > - anyone can connect up to 16 times via ssh. > > - anyone exceeding the connection limit is tarpitted, and must wait > > for an hour to try again. > > Note that while this may be adequate for your use cas

Re: DenyHosts

2016-01-17 Thread Christian Seiler
On 01/16/2016 10:57 AM, Reco wrote: > - anyone can connect up to 16 times via ssh. > - anyone exceeding the connection limit is tarpitted, and must wait > for an hour to try again. Note that while this may be adequate for your use case, I would caution that 16 connections / hour can easily (!) be

Re: DenyHosts

2016-01-16 Thread Chris Bannister
On Sat, Jan 16, 2016 at 04:49:35PM +1100, David wrote: > On 16 January 2016 at 15:48, Steve Matzura wrote: > > On Sat, 16 Jan 2016 01:55:38 +0300, Reco wrote: > > > >>A simple solution: > >> > >>iptables -I INPUT -p dcp -s 59.46.71.0/24 -j DROP > > > > iptables v1.4.21: unknown protocol "dcp" spec

Re: DenyHosts

2016-01-16 Thread Steve Matzura
Reco: On Sat, 16 Jan 2016 23:48:54 +0300, you wrote: >Correct sequence would be: > >iptables -F INPUT >iptables -A INPUT -p tcp --dport 22 -m conntrack --ctstate NEW \ > -m hashlimit --hashlimit 1/hour --hashlimit-burst 16 \ > --hashlimit-mode srcip --hashlimit-name ssh \ > --ha

Re: DenyHosts

2016-01-16 Thread Steve Matzura
Reco: On Sat, 16 Jan 2016 23:49:57 +0300, you wrote: >Reverse the order of these two rules. As I wrote in another part of this >thread, I mistook rules' sequence. Like this? iptables -I INPUT -p tcp --dport 22 --tcp-flags SYN,RST,ACK SYN \ -j DROP iptables -I INPUT -p tcp --dport 22 -m

Re: DenyHosts

2016-01-16 Thread Reco
Hi. On Sat, 16 Jan 2016 13:01:29 -0500 Steve Matzura wrote: > I tried redoing the tables: > > *filter > :INPUT ACCEPT [0:0] > :FORWARD ACCEPT [0:0] > :OUTPUT ACCEPT [0:0] > -A INPUT -p tcp -m tcp --dport 22 --tcp-flags SYN,RST,ACK SYN -j DROP > -A INPUT -p tcp -m tcp --dport 22 -m connt

Re: DenyHosts

2016-01-16 Thread Reco
Hi. On Sat, 16 Jan 2016 12:46:30 -0500 Steve Matzura wrote: > On Sat, 16 Jan 2016 20:16:28 +0300, you wrote: > > >> What'd I do? > >> > > > >Exactly this: > > > >iptables -F INPUT > >iptables -I INPUT -p tcp --dport 22 -m conntrack --ctstate NEW \ > > -m hashlimit --hashlimit 1/hou

Re: DenyHosts

2016-01-16 Thread Steve Matzura
On Sat, 16 Jan 2016 20:16:28 +0300, you wrote: >> What'd I do? >> > >Exactly this: > >iptables -F INPUT >iptables -I INPUT -p tcp --dport 22 -m conntrack --ctstate NEW \ > -m hashlimit --hashlimit 1/hour --hashlimit-burst 16 \ > --hashlimit-mode srcip --hashlimit-name ssh \ > --

Re: DenyHosts

2016-01-16 Thread Steve Matzura
I tried redoing the tables: *filter :INPUT ACCEPT [0:0] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [0:0] -A INPUT -p tcp -m tcp --dport 22 --tcp-flags SYN,RST,ACK SYN -j DROP -A INPUT -p tcp -m tcp --dport 22 -m conntrack --ctstate NEW -m hashlimit --hashlimit-upto 1/hour --hashlimit-burst 16 --hashlimi

Re: DenyHosts

2016-01-16 Thread Reco
Hi. On Sat, 16 Jan 2016 12:02:57 -0500 Steve Matzura wrote: > Well, I thought I was doing so well. I discover now that no one, > including me, can get into my system any more via ssh. Here are the > current iptables rules: > > *filter > :INPUT ACCEPT [0:0] > :FORWARD ACCEPT [0:0] > :OUT

Re: DenyHosts

2016-01-16 Thread Steve Matzura
Well, I thought I was doing so well. I discover now that no one, including me, can get into my system any more via ssh. Here are the current iptables rules: *filter :INPUT ACCEPT [0:0] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [0:0] -A INPUT -p tcp -m tcp --dport 22 --tcp-flags SYN,RST,ACK SYN -j DROP

Re: DenyHosts

2016-01-16 Thread Reco
Hi. On Sat, 16 Jan 2016 07:35:54 -0500 Steve Matzura wrote: > >But with conjunction with the previous one it implements the following > >policy: > > > >- anyone can connect up to 16 times via ssh. > >- anyone exceeding the connection limit is tarpitted, and must wait > >for an hour to try

Re: DenyHosts

2016-01-16 Thread Steve Matzura
Reco: On Sat, 16 Jan 2016 12:57:30 +0300, you wrote: >>-j, --jump target >> This specifies the target of the rule; i.e., what to do >> if the packet matches it. The target can be a user-defined >> chain (other than the one this rule is in), one of the special builtin

Re: DenyHosts

2016-01-16 Thread Reco
Hi. On Sat, 16 Jan 2016 00:49:17 -0500 Steve Matzura wrote: > Reco: > > All of this is an excellent learning opportunity for me. Please bear > with me just a bit as I ask the following: > > On Sat, 16 Jan 2016 01:55:38 +0300, you wrote: > > >A simple solution: > > > >iptables -I INPUT

Re: DenyHosts

2016-01-15 Thread Steve Matzura
Reco: All of this is an excellent learning opportunity for me. Please bear with me just a bit as I ask the following: On Sat, 16 Jan 2016 01:55:38 +0300, you wrote: >A simple solution: > >iptables -I INPUT -p dcp -s 59.46.71.0/24 -j DROP `-p dcp'? manpages says: [!] -p, --protocol proto

Re: DenyHosts

2016-01-15 Thread David
On 16 January 2016 at 15:48, Steve Matzura wrote: > On Sat, 16 Jan 2016 01:55:38 +0300, Reco wrote: > >>A simple solution: >> >>iptables -I INPUT -p dcp -s 59.46.71.0/24 -j DROP > > iptables v1.4.21: unknown protocol "dcp" specified > Try `iptables -h' or 'iptables --help' for more information. >

Re: DenyHosts

2016-01-15 Thread Steve Matzura
On Sat, 16 Jan 2016 01:55:38 +0300, Reco wrote: >A complex one: > >iptables -I INPUT -p tcp --dport 22 -m conntrack --ctstate NEW \ > -m hashlimit --hashlimit 1/hour --hashlimit-burst 16 \ > --hashlimit-mode srcip --hashlimit-name ssh \ > --hashlimit-htable-expire 6 -j ACCEPT

Re: DenyHosts

2016-01-15 Thread Steve Matzura
On Sat, 16 Jan 2016 01:55:38 +0300, Reco wrote: >A simple solution: > >iptables -I INPUT -p dcp -s 59.46.71.0/24 -j DROP iptables v1.4.21: unknown protocol "dcp" specified Try `iptables -h' or 'iptables --help' for more information. Should I try the complex solution, or find out what went wrong

Re: DenyHosts

2016-01-15 Thread Reco
; useless at blocking anything from the outside, so I've got to do it > internally. What are folks' favorite deny-hosts applications? I tried > installing DenyHosts, but it must be from a private repo because > whatever I have in sources couldn't find it. Why bother with userspac

Re: DenyHosts

2016-01-15 Thread Cláudio E. Elicker
king anything from the outside, so I've got to do it > internally. What are folks' favorite deny-hosts applications? I tried > installing DenyHosts, but it must be from a private repo because > whatever I have in sources couldn't find it. > > Thanks in advance. >

Re: DenyHosts

2016-01-15 Thread Sven Arvidsson
anything from the outside, so I've got to do it > internally. What are folks' favorite deny-hosts applications? I tried > installing DenyHosts, but it must be from a private repo because > whatever I have in sources couldn't find it. > > Thanks in advance. denyhosts o

DenyHosts

2016-01-15 Thread Steve Matzura
eny-hosts applications? I tried installing DenyHosts, but it must be from a private repo because whatever I have in sources couldn't find it. Thanks in advance.

Re: denyhosts error

2009-03-01 Thread Paul Cartwright
On Sun March 1 2009, Sjors Gielen wrote: >  > DenyHosts >  >  To: >  > r...@localhost > > There are two ways to fix this, 2 is probably preferred: > > 1) By default, in the Denyhosts Debian package, the configfile is > installed at /etc/denyhosts.conf. If you did

Re: denyhosts error

2009-03-01 Thread Sjors Gielen
Paul Cartwright schreef: I am getting these to my local user, and I can't figure out what process is sending them, so I can correct it: > From: > DenyHosts > To: > r...@localhost There are two ways to fix this, 2 is probably preferred: 1) By default, in the Denyhosts De

denyhosts error

2009-03-01 Thread Paul Cartwright
ipients. It's attached below. > > For further assistance, please send mail to postmaster. > > If you do so, please include this problem report. You can > delete your own text from the attached returned message. > >The mail system > > : mail transpo

Re: denyhosts + tcp wrappers?

2007-07-12 Thread Bob Proulx
Andrew Sackville-West wrote: > Craig Hurley wrote: > > My understanding of how denyhosts works is that it is scheduled to parse > > auth.log file every X seconds, identifing failed login attempts, it then > > tallies those attempts, if the total of failed login attempts

Re: denyhosts + tcp wrappers?

2007-07-12 Thread Andrew Sackville-West
On Thu, Jul 12, 2007 at 06:37:13PM +0100, Craig Hurley wrote: > On 11/07/2007 04:44, Bob Proulx wrote: >> If you are finding 'denyhosts' difficult then you may want to install >> 'fail2ban' as one standalone method to stop this since it is extremely >&g

Re: denyhosts + tcp wrappers?

2007-07-12 Thread Craig Hurley
On 11/07/2007 04:44, Bob Proulx wrote: If you are finding 'denyhosts' difficult then you may want to install 'fail2ban' as one standalone method to stop this since it is extremely simple. It should work out of the box. Denyhosts did work out of the box. My understand

Re: denyhosts + tcp wrappers?

2007-07-10 Thread Jude DaShiell
you might look at arno-iptables-script as another possibility. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Re: denyhosts + tcp wrappers?

2007-07-10 Thread Bob Proulx
Craig Hurley wrote: > Has anyone installed and configured DenyHosts > (http://denyhosts.sourceforge.net) so that it uses tcp wrappers on > debian? I am confident that script kiddies shaking my doors and trying to lift my windows cannot break through my passwords and rsa keys. If r

denyhosts + tcp wrappers?

2007-07-10 Thread Craig Hurley
Hello, Has anyone installed and configured DenyHosts (http://denyhosts.sourceforge.net) so that it uses tcp wrappers on debian? I've read this blog: http://tdot.blog-city.com/securing_ssh_with_denyhosts.htm but there are differences in the files/paths used on debian and what the blog-a

Re: DenyHosts...

2005-08-31 Thread Ralph Crongeyer
"Roberto C. Sanchez" <[EMAIL PROTECTED]> wrote: >On Wed, Aug 31, 2005 at 10:08:44AM -0400, Ralph Crongeyer wrote: >> Thanks Roberto. >> I haven't been able to get to my box to check and see if the package was >> available. Work is blocking outbound SSH connections. And I couldn't >find >> anything

Re: DenyHosts...

2005-08-31 Thread Roberto C. Sanchez
On Wed, Aug 31, 2005 at 10:08:44AM -0400, Ralph Crongeyer wrote: > Thanks Roberto. > I haven't been able to get to my box to check and see if the package was > available. Work is blocking outbound SSH connections. And I couldn't find > anything on the web. > > Would a "Request For Package" make i

Re: DenyHosts...

2005-08-31 Thread Ralph Crongeyer
Sven Hoexter <[EMAIL PROTECTED]> wrote: >On Tue, Aug 30, 2005 at 03:56:05PM -0400, Ralph Crongeyer wrote: >> Hi all, >> Is there a Debian Sarge package for "DenyHosts"? >> http://denyhosts.sourceforge.net/ >None that I know but fail2ban looks similar. &g

Re: DenyHosts...

2005-08-31 Thread Ralph Crongeyer
"Roberto C. Sanchez" <[EMAIL PROTECTED]> wrote: >On Tue, Aug 30, 2005 at 03:56:05PM -0400, Ralph Crongeyer wrote: >> Hi all, >> Is there a Debian Sarge package for "DenyHosts"? >> http://denyhosts.sourceforge.net/ >> > >There is not. Ho

Re: DenyHosts...

2005-08-31 Thread Sven Hoexter
On Tue, Aug 30, 2005 at 03:56:05PM -0400, Ralph Crongeyer wrote: > Hi all, > Is there a Debian Sarge package for "DenyHosts"? > http://denyhosts.sourceforge.net/ None that I know but fail2ban looks similar. Sven -- If God passed a mic to me to speak I'd say stay in b

Re: DenyHosts...

2005-08-30 Thread Roberto C. Sanchez
On Tue, Aug 30, 2005 at 03:56:05PM -0400, Ralph Crongeyer wrote: > Hi all, > Is there a Debian Sarge package for "DenyHosts"? > http://denyhosts.sourceforge.net/ > There is not. However, you can use the reportbug package to file a RFP bug. -Roberto -- R

DenyHosts...

2005-08-30 Thread Ralph Crongeyer
Hi all, Is there a Debian Sarge package for "DenyHosts"? http://denyhosts.sourceforge.net/ Thanks Ralph -- Linux, to keep you humble.