Hi Will.

On 22 Apr 2014, at 3:01 am, Will Nordmeyer, WnA Consulting Services 
<[email protected]> wrote:

> On my server, it seems that one mistake entering the admin password (and 
> maybe site admin passwords) blocks the offending IP.  Since I have a rather 
> complex admin password, I'd like to tweak dfix/dfix2 to give me a slightly 
> wider allowance.
> 
> I've reviewed dfix2.sh but that just has a start/stop process - the start 
> process makes sure the iptables lists exist, and sets up a list of trusted 
> IPs from the ifconfig & resolv.conf file.
> 
> dfix.sh appears to do all the work but I haven't managed to track exactly 
> where the limit for bad password is set.
> 
> I'd also like to improve the logging so that when it blocks an IP, it gives 
> the reason behind it.
> 

Initially, have a look at /var/log/sec to see details of a reason for block. 
There are rule names like ssh-b1... Let me know which one is hitting your log 
file in this situation, and I can tell you how to tweak.

Note: I am away travelling, but I'll get you a response asap.

Greg.
_______________________________________________
Blueonyx mailing list
[email protected]
http://mail.blueonyx.it/mailman/listinfo/blueonyx

Reply via email to