Re: can we design a modified fail2ban ?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello,

J. Bakshi a écrit :
> 
> fail2ban is a popular application to prevent the brute-force attack
> against ssh and also against imap, pop3 etc.. But fail2ban actually
> blacklist the IP and this is what fail2ban has been designed for. Now a
> days we can design the same with iptables. I wonder if iptables can
> provide more liberty to match IP as well as port combination so that we
> don't need to blacklist the IP but only block the attempts from the IP
> based on port. Say more than 3 ssh attempt from IP xxx.xxx.xxx.xxx is
> detected and no more ssh attempt from the same ip is no more possible
> but pop and imap still works. Is it really possible with iptables ?

Detected how ? fail2ban detects authentication failures by parsing the
server logs. iptables cannot do this, and IHMO should not do this. This
is just not its purpose.
--
To unsubscribe from this list: send the line "unsubscribe netfilter" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux