Robert T Wyatt wrote:
Two questions: 1) you never told us the output of: 'ps aux | grep
denyhosts' and 2)

Right, here you go:

root 5756 4.1 1.9 20512 17964 ? S 09:11 2:13 /usr/bin/python /usr/bin/denyhosts --daemon -c /etc/denyhosts.conf root 6138 0.0 0.0 1404 460 pts/321 S+ 10:05 0:00 grep --colour=auto denyhosts


how do you reckon the offending IP got into hosts.deny
(through syncing or detection)?

I believe the IP got in through the initial startup of denyhosts. When I installed denyhosts, I went with the default config to start, which does not use syncing. Also, hosts.deny did not exist on the server. When I ran it for the first time:

/etc/init.d/denyhosts start   (on a gentoo system)

it took a considerable amount of time for the cursor to return (like 10 minutes), and then I had this big fat /etc/hosts.deny, which included my own IP! That's when I put myself into hosts.allow.

This morning I noticed the attack I search hosts.deny and saw that this IP # was comfortably in the middle of the list, further suggesting it is not a recent entry.
begin:vcard
fn:Kenneth  Downs
n:Downs;Kenneth 
adr;dom:;;347 Main Street;East Setauket;NY;11733
email;internet:[EMAIL PROTECTED]
tel;work:631-689-7200
tel;fax:631-689-0527
tel;cell:631-379-0010
x-mozilla-html:FALSE
url:http://www.secdat.com
version:2.1
end:vcard

-------------------------------------------------------------------------
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT & business topics through brief surveys - and earn cash
http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV
_______________________________________________
Denyhosts-user mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/denyhosts-user

Reply via email to