On Apr 5, 2011, at 11:46 PM, Ljubomir Ljubojevic wrote: rrichard@xxxxxxxxxx wrote: Indeed! I run
Fail2Ban not only against SSH, but against SMTP/AUTH and IMAPS/POP3S (the
only client mail protocols we support). It's amazing how many dictionary
attacks take place against SMTP by persistent spamers! Besides the effect
against dictionary attacks, it makes the morning reading of the secure log
a pleasant experience. :-)
My SMTP server has Reverse DNS check active, so any SMTP request from IP that does not have Reverse DNS record is automatically forbidden. Even SMTP servers tht are not properly configured (like one Bank server in my country that sends mails from some obscure IP without DNS record even thou I know they are legit) are denied. fail2ban had some wrong with it, from the standpoint of my CentOS 5.x server (can't remember what I disliked), wheather it was rpm availability or something else, so I chose denyhosts. There was whole week recently without a single ssh attack on my 3 PC's (2 servers). Ljubomir _______________________________________________ CentOS mailing list CentOS@xxxxxxxxxxhttp://lists.centos.org/mailman/listinfo/centos
I have a centralized bridge PF (Packet Filter) setup and all my servers behind it. All the servers have fail2ban installed and the same on the firewall, so any malicious knock offs on the internal servers ignites the centralized PF that blocks the hosts right away. As mentioned above, I have been using fail2ban for SSH/SMTP/IMAP/POP3 and also have merged content filtering regexes from Amavis into it. That(regex) is the part I love about fail2ban, my fail2ban installation is on a CentOS 5.x box, rpm is available in rpmforge.
Gaurav |
Attachment:
PGP.sig
Description: This is a digitally signed message part
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos