NetBSD-Users archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: fail2ban-like tool ?
On Thu, Sep 29, 2011 at 02:15:53PM +0200, Étienne wrote:
> "Manuel Bouyer" <bouyer%antioche.eu.org@localhost> wrote:
>
> > Hello,
> > I have a centralized log server, and I'd like to have a real-time
> > analysis tool to block the bad guys at the router level.
> > I looked at fail2ban and it looks like it could do the job, but
> > maybe there's some other tools I'm not awayre of.
> > What are you guys using for this kind of job ?
>
> I use a PF macro found in a howto called "Cleaning up the backyard". It seems
> to be unavailable right now. Extracted from Google cache:
>
> ?grind? option will be used on sensitive services where outsiders
> grinding logins should not be allowed, brute forcing SSH or MYSQL
> logins for example. It translates to say that any source can only
> have a total of three connections, and they may not create them at a
> rate faster than two every five minutes. If they do, they will be
> added to the abusers table and every packet/session will be globally
> dropped. ?grind? is only the name of the macro and could be any string
> desired.
>
> grind="(max?src?conn 3, max?src?conn?rate 2/5, overload <abusers> flush
> global)"
>
> This mostly protects against dictionnary attacks, login with public/private
> keys only makes it better. There's no analysis/report of the logs, though,
> I'm not sure how important it is to you. Last, I use this with OpenBSD's PF
> version, but I would expect the portable version to accept it as well.
that won't work for what I have in mind. You can't restrict access to
a web server, yet I want to block attacks against it (webmail mostly,
but also the other login boxes you can find on typical web tools today)
--
Manuel Bouyer <bouyer%antioche.eu.org@localhost>
NetBSD: 26 ans d'experience feront toujours la difference
--
Home |
Main Index |
Thread Index |
Old Index