Dear Wes,

Thankyou for your input. Indeed I checked it before this post that "-Dusm"
can capture some Unknown user, bad Auth/Priv password.
such logs then can be filtered in the fail2ban.

It also makes sense about what you say regarding setting up a firewall.

Incase someone is wondering about the fail2ban filters and jail, feel free
to check out the fail2ban issue 3767 (
https://github.com/fail2ban/fail2ban/issues/3767)

Cheers

On Fri, Jun 21, 2024 at 4:41 PM Wes Hardaker <harda...@users.sourceforge.net>
wrote:

> Prankur Chauhan <prankur.chauha...@gmail.com> writes:
>
> > Is it possible to identify a malicious IP who is trying multiple times
> > authentication requests with wrong credentials and increase the
> > response time for each subsequent auth request, consequently also lock
> > him/her out for some duration?
> >
> > Do you guys know if snmpd can be configured to work with tools such as
> fail2ban?
>
> A few things:
>
> 1. With the right debugging flags turned on (try -Dusm) you might be
>    able to watch for failures and create a fail2ban hook to provide
>    fail2ban with new jail entries.
>
> 2. But my importantly, you should never ever have an snmp agent (of any
>    kind) connected to the internet without a firewall in front of it that
>    restricts access to only trusted IP addresses.  This generally is true
>    for any SNMP or other management control protocol -- they should be
>    accessible only from internal networks.
>
> --
> Wes Hardaker
> Please mail all replies to net-snmp-coders@lists.sourceforge.net
>


-- 
Cheers
Prankur
_______________________________________________
Net-snmp-coders mailing list
Net-snmp-coders@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/net-snmp-coders

Reply via email to