On 21 March 2010 00:25, Craig White <craigwh...@azapple.com> wrote:

> On Sat, 2010-03-20 at 23:17 +0100, Vadkan Jozsef wrote:
> > Two pc's:
> >
> > 1 - router
> > 2 - logger
> >
> > Situation: someone tries to bruteforce into a server, and the logger
> > get's a log about it [e.g.: ssh login failed].
> >
> > What's the best method to ban that ip [what is bruteforcig a server]
> > what was logged on the logger?
> > I need to ban the ip on the router pc.
> >
> > How can i send the bad ip to the router, to ban it?
> >
> > Just run a cronjob, and e.g.: scp the list of ip's from the logger to
> > the router, then ban the ip from the list on the router pc?
> >
> > Or is there any "offical" method for this?
> >
> > I'm just asking for docs/howtos.. :\ to get started..
> ----
> personally, I always use 'denyhosts' package which can be either single
> system or can share data with other systems.
>
> yum search denyhosts
>
> Craig
>
>
> --
> This message has been scanned for viruses and
> dangerous content by MailScanner, and is
> believed to be clean.
>
> --
> users mailing list
> users@lists.fedoraproject.org
> To unsubscribe or change subscription options:
> https://admin.fedoraproject.org/mailman/listinfo/users
> Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
>
Does not 'fail2ban' work for bruteforce attacks?
-- 
users mailing list
users@lists.fedoraproject.org
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines

Reply via email to