Re: blacklistd analogue

2021-03-25 Thread Holger Glaess
hi you can do this with ossec.net holger Am 25.03.21 um 18:00 schrieb Kapetanakis Giannis: How about a distributed setup? Has anyone thought of a way getting IPs from various servers (say linux & fail2ban) to the central OpenBSD (pf) firewall? Ideally with history in order to punish mor

Re: Adding accessibility for blind and low vision individuals to OpenBSD?

2021-03-25 Thread Ethin Probst
Ah, I understand. I can't seem to find the protocol that Tmux uses. The pipe-pain command might work, though. On 3/25/21, Stuart Henderson wrote: > For the installer, honestly I think the only sane way is to drive it > from another OS with an existing screen reader via serial console. > > If Fenr

Re: Adding accessibility for blind and low vision individuals to OpenBSD?

2021-03-25 Thread Stuart Henderson
For the installer, honestly I think the only sane way is to drive it from another OS with an existing screen reader via serial console. If Fenrir uses a terminal emulator library itself then it maybe possible to get it to work with tmux, at least in a single window. It has a "pipe-pane" command th

Re: Adding accessibility for blind and low vision individuals to OpenBSD?

2021-03-25 Thread Theo de Raadt
> If the tmux server uses the TMux protocol as described in RFC 1692, it Uhm no, that is quite a big misunderstanding.

Re: Adding accessibility for blind and low vision individuals to OpenBSD?

2021-03-25 Thread Ethin Probst
If the tmux server uses the TMux protocol as described in RFC 1692, it (theoretically) shouldn't be too difficult to build a screen driver that can interact with it. The pty module uses the pyte terminal emulator library, so we might even be able to subclass the `Screen` class it exposes to make it

Re: blacklistd analogue

2021-03-25 Thread Stuart Henderson
On 2021-03-25, Kapetanakis Giannis wrote: > How about a distributed setup? Not on OpenBSD yet but there is "crowdsec"

Re: Adding accessibility for blind and low vision individuals to OpenBSD?

2021-03-25 Thread Stuart Henderson
On 2021-03-23, Ethin Probst wrote: > Apologies if this is unnecessary sending of this, but I sent this to > the tech OpenBSD mailing list (which might've not been the right list) > so I'm re-sending it to this one just in case. (It might've gotten > lost too.) The original email is below: It did

Re: blacklistd analogue

2021-03-25 Thread Lars Noodén
On 3/25/21 7:00 PM, Kapetanakis Giannis wrote: [snip]> I had plans on looking to bgp to distribute the IPs around but maybe > there is already a better way doing this. [snip] I read this one a while back: "Using OpenBGPD to distribute pf table updates to your servers" https://www.echothrust.com/b

snapshot odds: mail for root and xenodm

2021-03-25 Thread Mihai Popescu
Hello, I just installed an amd64 snapshot and spotted 2 odd things. I see there is a mail for root, but when i run mail command i get the text No mail for root. The other is I login in xenodm to use cwm for the fisrt time after install and the xenodm is restarted. Second login and future logins ar

Re: blacklistd analogue

2021-03-25 Thread Daniel Jakots
On Thu, 25 Mar 2021 19:00:52 +0200, Kapetanakis Giannis wrote: > How about a distributed setup? > > Has anyone thought of a way getting IPs from various servers (say > linux & fail2ban) to the central OpenBSD (pf) firewall? > > Ideally with history in order to punish more the frequent abusers.

Re: blacklistd analogue

2021-03-25 Thread Kapetanakis Giannis
How about a distributed setup? Has anyone thought of a way getting IPs from various servers (say linux & fail2ban) to the central OpenBSD (pf) firewall? Ideally with history in order to punish more the frequent abusers. I had plans on looking to bgp to distribute the IPs around but maybe the

Re: blacklistd analogue

2021-03-25 Thread Matthias Pressfreund
You could try this: https://github.com/mpfr/pftbld It uses pf tables instead of anchors to achieve the same goal. Handling sshd abusers may be accomplished by first using pf source-tracking to catch them. For example: - table persist block in quick from pass in on egress proto tcp to egres

Re: blacklistd analogue

2021-03-25 Thread Родин Максим
Hello, Why not just use a script that reads auth logs and adds abusive hosts to pf table using some patterns? And you then decide what to do with addresses in that table and how long should they stay in that table. user~$ pfctl -t bad_ips -T show | wc -l 69079 24.03.2021 21:33, jeanpierre п