ssword. However, to reduce
noise it helps to avoid easily guessable usernames (coinciding with domain
name, for instance) or add random suffix to them, e.g. admin.fuifcgju68 (in
*addition* to having a good long random password).
--
With Best Regards,
Marat K
github.com/qm2k/burp_integration/blob/master/etc/fail2ban/filter.d/burp-auth.conf
I'd also check your IPv6 connectivity (including ICMPv6) to the client,
these timeouts are more likely caused by MTU problems than malicious intent.
--
With Best Re
latter.
Frankly, I don't know, but it's easy to check experimentally for
specific version of fail2ban. I never considered skipping lines a
problem, unless someone can reliably bypass your filter completely.
--
With Best Regards,
Mar