[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

fail2ban [was: howto block ssh brute-force]



also sprach johannes weiß <weissi_ml@tux4u.de> [2006.03.13.1132 +0100]:
> I use fail2ban and I'm very happy with it.

Am I correct in assuming that it simply adds rules like

  -A fail2ban_chain -s 1.2.3.4/32 -j DROP

to iptables whenever 1.2.3.4/32 has too many login failures?

Does it expire entries?

-- 
Please do not send copies of list mail to me; I read the list!
 
 .''`.     martin f. krafft <madduck@debian.org>
: :'  :    proud Debian developer and author: http://debiansystem.info
`. `'`
  `-  Debian - when you have better things to do than fixing a system
 
Invalid/expired PGP (sub)keys? Use subkeys.pgp.net as keyserver!
 
"we are ready for any unforeseen event that may or may not occur." 
                                                      - george w. bush 

Attachment: signature.asc
Description: Digital signature (GPG/PGP)


Reply to: