Over the weekend I was noticing that there were a lot of failed
login attempts from particular IP addresses into my sshd and
that got me thinking, why can't I easily have sshd work with
ipfilter and block those IP addresses?

At present there are a couple of things you might wish to do:
- build a script that is specifically for that purpose (grok sshd's
  syslog output and poke ipfilter);
- run snort or some other host intrusion detection software
  that pulls data out of the log files for things like sshd.

My problem with both is that they rely on parsing the "cooked"
output of some other application. That seems somewhat prone
to error, never mind being less than efficient. There's also the
disk space risk...

Wouldn't it be better if sshd was able to make some function
call and tell something about those repeated login failures?
And then if there was some way to instruct that to manage
things like pools of bad IP addresses in IPFilter?

Before I start hacking on code, is there some other area of
Solaris's security that should be leveraged to do this?

For example, are there any C2 audit events that collect
information like this?

Cheers,
Darren


Reply via email to