[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Maximo de conexiones permitidas.



El Sun, 05 Oct 2008 04:22:35 -0300
Julián Esteban Perconti <vh1988@yahoo.com.ar> escribió:

> john vera escribió:
> > me atrevo a recomendar Fail2band!!! Exito!!!
> > 
> > 2008/9/30 Julián Esteban Perconti <vh1988@yahoo.com.ar>:
> >> Hola lista:
> >> Escribo para saber si es posible, sobre mi ip publica y un puerto
> >> específico, se puede establecer un maximo de conexiones.
> >> Es decir, que cierta cantidad de ip's publicas se conecten / o establezcan
> >> una conexion a mi pc en un puerto especifico.
> >> Y si se pueden "matar" conexiones al estilo comando kill.
> >> Gracias de antemano.
> >>
> >>        Julian.
> >>
> >>
> >> --
> >> To UNSUBSCRIBE, email to debian-user-spanish-REQUEST@lists.debian.org
> >> with a subject of "unsubscribe". Trouble? Contact
> >> listmaster@lists.debian.org
> >>
> >>
> > 
> Hola se fue tu correo al privado, no hay problema ..
> Te cuento que busque Fail2band en google, y los resultados fueron 
> escasos y nada en concreto.., si podes contame un poco mejor que es..
> estaria agradecido..
> 	Saludos coordiales.
> 
> 

~ apt-cache show fail2ban

Package: fail2ban
Priority: optional
Section: net
Installed-Size: 616
Maintainer: Yaroslav Halchenko <debian@onerussian.com>
Architecture: all
Version: 0.8.3-1
Depends: python (>= 2.4), python-central (>= 0.6.7), lsb-base (>= 2.0-7)
Recommends: iptables, whois
Suggests: python-gamin, mailx
Filename: pool/main/f/fail2ban/fail2ban_0.8.3-1_all.deb
Size: 86084
MD5sum: 28fa25eb5b3466ce6366fc2d9c4685c0
SHA1: 62fbc892af96ec25c62ace075a6d102c87070765
SHA256: 9e4cfe000254580a1001d78ea5109359adec7bea885820252baf2fb06cc74676
Description: bans IPs that cause multiple authentication errors
 Monitors log files (e.g. /var/log/auth.log,
 /var/log/apache/access.log) and temporarily or persistently bans
 failure-prone addresses by updating existing firewall rules. The
 software was completely rewritten at version 0.7.0 and now allows
 easy specification of different actions to be taken such as to ban an
 IP using iptables or hostsdeny rules, or simply to send a
 notification email. Currently, by default, supports ssh/apache/vsftpd
 but configuration can be easily extended for monitoring any other ASCII
 file. All filters and actions are given in the config files, thus
 fail2ban can be adopted to be used with a variety of files and
 firewalls.
Homepage: http://www.fail2ban.org
Python-Version: current, >= 2.4
Tag: admin::{automation,logging,monitoring}, implemented-in::python, interface::commandline, interface::daemon, network::firewall, protocol::ip, role::program, security::{authentication,firewall,ids,log-analyzer}, use::login, use::monitor, works-with::logfile, works-with::text, works-with-format::plaintext


-- 
Manolo Díaz


Reply to: