>
> >        You don't mention anything about the rate...
> >       Anyway, fail2ban does look at hosts individually ...it doesn't
> >       "lump together stats for requests coming from different IP
> >       addresses".
> >
> >      If this "DOS" attack simply involves -for instance- requests to
> >      legitimate web pages and not attempts to brute force log in to your
> >      website (using - for example - a "dictionary attack") then you are
> >      really talking about an attack that is simply a matter of "rate".
> >      In other words these ten hosts are requesting legitimate web pages
> >      from your site at a very high rate (perhaps tens or hundreds of
> >      requests per second).
> >
> >      If that's the case then the tool for that is apache "mod evasive" -
> >      not fail2ban.
>
>
> Good point.  fail2ban isn't exactly the right tool for this.
>

There appears to be a project but I don't think it's maintained:
https://github.com/XaF/fail2ban-subnets

and there is aq Git issue/feature request: ttps://
github.com/fail2ban/fail2ban/issues/927
_______________________________________________
Fail2ban-users mailing list
Fail2ban-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/fail2ban-users

Reply via email to