tag 494487 + pending
thanks

Ok - convinced now ;)

Due to its specificity I would prefer to have it as an additional
filter/jail as opposed to integrating it into existing ssh one.

So, please find attached filters.d file and relevant config for
jails.local is smth like following piece

NB feel free to tune maxretry up to your liking and please let me
know what is the sensible one - ie how many times a single IP triggers
such log lines on average. Please let me know so I tune it in shipped
jail.conf before uploading


[ssh-ddos]

enabled = true
port    = ssh
filter  = sshd-ddos
logpath  = /var/log/auth.log
maxretry = 6

The package is in the middle of fixing another bug, so I want to
preclude uploading before I settle the solution for it with
upstream.

-- 
                                  .-.
=------------------------------   /v\  ----------------------------=
Keep in touch                    // \\     (yoh@|www.)onerussian.com
Yaroslav Halchenko              /(   )\               ICQ#: 60653192
                   Linux User    ^^-^^    [175555]


# Fail2Ban configuration file
#
# Author: Yaroslav Halchenko
#
# $Revision: 471 $
#

[Definition]

# Option:  failregex
# Notes.:  regex to match the password failures messages in the logfile. The
#          host must be matched by a group named "host". The tag "<HOST>" can
#          be used for standard IP/hostname matching.
# Values:  TEXT
#
failregex = sshd\[\S*\]: Did not receive identification string from <HOST>

# Option:  ignoreregex
# Notes.:  regex to ignore. If this regex matches, the line is ignored.
# Values:  TEXT
#
ignoreregex = 

Reply via email to