this has allready been done, and it works well. use the tarball, the .rpm has some dependency issues with itself :-) http://denyhosts.sourceforge.net/ Cheers Szemir
On July 14, 2006 09:44, Wendell Nichols wrote: > I too get a lot of this crap. The hosts that do this either belong to > hackers, or have been compromised by hackers. Either way, I've started > blacklisting them. Right now it is manual, but I'm going to write a > script to troll the syslog and automatically blacklist any host that > gets three wrong passwords on sshd. > I don't mind publishing the blacklist for others to use, but I suspect > that this is already being done. Anyone know anything about that? > wcn > > Peter Van den Wildenbergh wrote: > > Hi All : > > > > I've seen a lot of these in my logs lately: > > Jul 5 04:25:13 devenv sshd[21935]: Invalid user accent from > > 220.117.205.100 Jul 5 04:25:14 devenv sshd[21937]: Invalid user access > > from 220.117.205.100 Jul 5 04:25:16 devenv sshd[21939]: Invalid user > > account from 220.117.205.100 Jul 5 04:25:18 devenv sshd[21941]: Invalid > > user acount from 220.117.205.100 Jul 5 04:25:20 devenv sshd[21943]: > > Invalid user ace from 220.117.205.100 Jul 5 04:25:22 devenv sshd[21945]: > > Invalid user addict from 220.117.205.100 Jul 5 04:25:24 devenv > > sshd[21947]: Invalid user address from 220.117.205.100 Jul 5 04:25:26 > > devenv sshd[21949]: Invalid user adept from 220.117.205.100 Jul 5 > > 04:25:28 devenv sshd[21951]: Invalid user admit from 220.117.205.100 Jul > > 5 04:25:29 devenv sshd[21953]: Invalid user admision from 220.117.205.100 > > Jul 5 04:25:31 devenv sshd[21955]: Invalid user adult from > > 220.117.205.100 Jul 5 04:25:33 devenv sshd[21957]: Invalid user advance > > from 220.117.205.100 Jul 5 04:25:35 devenv sshd[21959]: Invalid user > > advertise from 220.117.205.100 Jul 5 04:25:37 devenv sshd[21961]: > > Invalid user advice from 220.117.205.100 Jul 5 04:25:39 devenv > > sshd[21963]: Invalid user afraid from 220.117.205.100 Jul 5 04:25:41 > > devenv sshd[21965]: Invalid user agency from 220.117.205.100 Jul 5 > > 04:25:43 devenv sshd[21967]: Invalid user age from 220.117.205.100 Jul 5 > > 04:25:44 devenv sshd[21969]: Invalid user agent from 220.117.205.100 Jul > > 5 04:25:46 devenv sshd[21971]: Invalid user ago from 220.117.205.100 Jul > > 5 04:25:48 devenv sshd[21973]: Invalid user agree from 220.117.205.100 > > Jul 5 04:25:50 devenv sshd[21975]: Invalid user agreenent from > > 220.117.205.100 > > > > > > After a while the IP address change but the attack is simular > > a dictionary of names with a couple common BAD passwords like > > temp, root, password... per user name. > > > > I got an IPCop firewall is there any way I can automate a temporarly > > block (DROP package IP table rule) for source address after 3 > > unsuccessful attempts from the same IP? The ssh server is sitting behind > > the IPCop. > > > > Snort maybe? Although I don't know that product. > > Any 'known' easy plug-ins for IPCop? > > > > Thanks for all tips and advice > > > > Peter > > > > _______________________________________________ > > clug-talk mailing list > > [email protected] > > http://clug.ca/mailman/listinfo/clug-talk_clug.ca > > Mailing List Guidelines (http://clug.ca/ml_guidelines.php) > > **Please remove these lines when replying > > _______________________________________________ > clug-talk mailing list > [email protected] > http://clug.ca/mailman/listinfo/clug-talk_clug.ca > Mailing List Guidelines (http://clug.ca/ml_guidelines.php) > **Please remove these lines when replying _______________________________________________ clug-talk mailing list [email protected] http://clug.ca/mailman/listinfo/clug-talk_clug.ca Mailing List Guidelines (http://clug.ca/ml_guidelines.php) **Please remove these lines when replying

