On Apr 5, 2011, at 11:46 PM, Ljubomir Ljubojevic wrote:

> rrich...@blythe.org wrote:
>> Indeed! I run
>> Fail2Ban not only against SSH, but against SMTP/AUTH and IMAPS/POP3S (the
>> only client mail protocols we support). It's amazing how many dictionary
>> attacks take place against SMTP by persistent spamers! Besides the effect
>> against dictionary attacks, it makes the morning reading of the secure log
>> a pleasant experience. :-)
> 
> My SMTP server has Reverse DNS check active, so any SMTP request from IP 
>  that does not have Reverse DNS record is automatically forbidden. Even 
> SMTP servers tht are not properly configured  (like one Bank server in 
> my country that sends mails from some obscure IP without DNS record even 
> thou I know they are legit) are denied.
> 
> fail2ban had some wrong with it, from the standpoint of my CentOS 5.x 
> server (can't remember what I disliked), wheather it was rpm 
> availability or something else, so I chose denyhosts. There was whole 
> week recently without a single ssh attack on my 3 PC's (2 servers).
> 
> Ljubomir
> _______________________________________________
> CentOS mailing list
> CentOS@centos.org
> http://lists.centos.org/mailman/listinfo/centos

I have a centralized bridge PF (Packet Filter) setup and all my servers behind 
it. All the servers have fail2ban installed and the same on the firewall, so 
any malicious knock offs on the internal servers ignites the centralized PF 
that blocks the hosts right away. As mentioned above, I have been using 
fail2ban for SSH/SMTP/IMAP/POP3 and also have merged content filtering regexes 
from Amavis into it. That(regex) is the part I love about fail2ban,  my 
fail2ban installation is on a CentOS 5.x box, rpm is available in rpmforge.

Gaurav

Attachment: PGP.sig
Description: This is a digitally signed message part

_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to