Greetings

We have a large number of nodes (servers) running linux behind PFSense in transparent mode.
We are recent PFSense converts...

I am thinking it might be nice to see if someone could do the following.
And therefore Want to post a $100 bounty on this.

Most of the Linux world uses BFD and/or CSF/LFD to find brute force issues...

What I would like to do is this.


1. Have the PFSense server query the Log files from the servers running behind the system.

Logs look something like this

Deny.txt
210.0.211.114 # lfd: 5 (ftpd) login failures from 210.0.211.114 - Sat Sep 20 18:29:29 2008 74.143.21.36 # lfd: 5 (ftpd) login failures from 74.143.21.36 - Sat Sep 20 22:36:19 2008 216.232.70.72 # lfd: 5 (pop3d) login failures from 216.232.70.72 - Sun Sep 21 08:14:16 2008

2. Using Perl or another application bring in the ip's from the deny log files and then block them from the entire network by dynamically adding a ruleset to PFSense.

I would like to see this be able to run on a cron say - every 5 minutes or so on each server.

Another option now that I think about it - would be have each log write to a syslog server perhaps or get copied to 1 location and then have the pfsense system pull from it.

I would like to have this help smaller and larger network systems however...

Questions?



---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to