Re: can we design a modified fail2ban ?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Friday 2010-04-16 05:57, J. Bakshi wrote:
>
>fail2ban is a popular application to prevent the brute-force attack
>against ssh and also against imap, pop3 etc.. But fail2ban actually
>blacklist the IP and this is what fail2ban has been designed for.
>Now a days [nowadays] we can design the same with iptables.

fail2ban has the ability - if I read its own short description right - to
already use various blocking methods, including not only /etc/hosts.deny
but also iptables.

>I wonder if iptables can
>provide more liberty to match IP as well as port combination so that we
>don't need to blacklist the IP but only block the attempts from the IP
>based on port. Say more than 3 ssh attempt from IP xxx.xxx.xxx.xxx is
>detected and no more ssh attempt from the same ip is no more possible
>but pop and imap still works. Is it really possible with iptables ? Any
>idea ?
>
>Thanks
>
>-- 
>জয়দীপ বক্সী
>
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux