Jerry Stuckle <jstuc...@attglobal.net> writes:

>> <snipped previous context>
>
> OK, that makes a lot of sense.  However, there are two problems with 
> fail2ban, also.  The first one is it requires an authentication failure. 
>   Port probing will not trigger it (but recent can).  The second being 
> it depends on log entries, which can be buffered.  I have it monitoring 
> my email (smtp/imap/pop3) ports.  Even though it is set to trigger after 
> two failures, I have seen as many as 50+ failures logged from the same 
> ip address within seconds before fail2ban is triggered.
>

To address your first problem with fail2ban, the sshd-ddos filter for
fail2ban does not require authentication failures.  sshd will log a
message of the form "Did not receive identification string from <IP>" if
someone makes a TCP connection and then disconnects without going
through the SSH handshake.

> I'm not so worried about SYN attacks from spoofed IP addresses as I am 
> attempts to break in (despite several security measures).  I want to 
> shut them off ASAP.
>
-- 
regards,
kushal


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/51d11e9f.e4d8420a.7b72.2...@mx.google.com

Reply via email to