Grant,
       You don't mention anything about the rate...
      Anyway, fail2ban does look at hosts individually ...it doesn't
      "lump together stats for requests coming from different IP
      addresses". 

     If this "DOS" attack simply involves -for instance- requests to
     legitimate web pages and not attempts to brute force log in to your
     website (using - for example - a "dictionary attack") then you are
     really talking about an attack that is simply a matter of "rate". 
     In other words these ten hosts are requesting legitimate web pages
     from your site at a very high rate (perhaps tens or hundreds of
     requests per second).  

     If that's the case then the tool for that is apache "mod evasive" -
     not fail2ban.  



On Tue, Dec 13, 2016, at 07:28 AM, Grant wrote:

> >> Well I certainly use it to defend from that kind of attack all the time.
> >>  Can you give us some idea of the rate (ie: how many requests per
> >> second)?   Also, for that kind of attack it's important to be using the
> >> recidive filter.    By any chance is it a wordpress site?
> 
> 
> So you're saying fail2ban should have caught it so they must have been
> making requests at a rate lower than my configured maximum?  How does
> fail2ban know to lump together stats for requests coming from
> different IP addresses?
> 
> - Grant

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most 
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
Fail2ban-users mailing list
Fail2ban-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/fail2ban-users

Reply via email to