Hello,

  Because everyone needs to try several ways of skinning a cat before
finding their preferred method....


  I always configure denyhosts with:

HOSTS_DENY = /etc/denyhosts.blocked
BLOCK_SERVICE =

Which gives you a very nice file of exactly what denyhosts has blocked,
doesn't mess with your existing hosts.deny, etc., and put a global:

ALL : /etc/denyhosts.blocked : DENY

in hosts.allow.  (I wish that were the default debian setup.)  In a
quick search I see an apache module that should be able to use this file
directly to block requests:

    http://www.modsecurity.org/

     1. I've never used that module, but in a quick glance at the
        documentation it looks to be capable with pmFromFile:
 
http://www.modsecurity.org/documentation/modsecurity-apache/2.5.7/modsecurity2-apache-reference.html#N11BFB

That would save script writing to convert to "Deny from .." syntax, but
I don't know if it solves the need to reload apache or not.  And of
course firewall rules may server you better, but....


Jesse


On Tue, 2008-10-28 at 23:19 +0100, Nils Breunese (Lemonbit) wrote:
> > Also, Apache must be restarted AFAIK in order to block an attacker  
> > using it's internal ALLOW/DENY rules.  Of course, you could block
> it  
> > at the kernel level w/ iptables if you wanted.
> 
> That's what fail2ban does by default: it creates firewall rules. 

-- 
Jesse Norell
Kentec Communications, Inc.
[EMAIL PROTECTED]

-------------------------------------------------------------------------
This SF.Net email is sponsored by the Moblin Your Move Developer's challenge
Build the coolest Linux based applications with Moblin SDK & win great prizes
Grand prize is a trip for two to an Open Source event anywhere in the world
http://moblin-contest.org/redirect.php?banner_id=100&url=/
_______________________________________________
Denyhosts-user mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/denyhosts-user

Reply via email to