Luke wrote:

[snip]
> I've now set = dup_delay 0 which logs all failed entries and its
> still not blocking VNC failed attempts it does block ssh however.
> I'll probably just end up disabling vnc or just enabling it on
> demand.

You guys are misunderstanding what I say:

1.  The "--verbose --debug" was not to correct anything, neither to get
a big "here is the problem" message, it is to see what DH is doing in
detail, which includes configuration and data.

2.  When I say "a problem" that doesn't mean "the problem", I just
pointed out that DH will not handle the log with multiple equal lines
elided, which is not the problem you are having.

I don't use Mac OS X, or VNC very often, but many of us use DH to stop
ftp attacks, which are similar to ssh and to your VNC log, and it works
fine.

The only 2 things that can be wrong are the regexes used, and the times
used (i.e. too much time between tries and they are ignored, too little
time to keep the IP banned...)  The second cause doesn't seem to be your
problem, I would focus on the first.

Alternatives: use fail2ban, same python regexes but in a different
configuration format that is designed from start to work with multiple
services, plus it has its own test tool, minus it doesn't have global
database.  I use both (alone, not together) on different servers,
fail2ban in my mail server (which is really 2 services to protect, smtp
and imap/pop3), plus ssh, and I could add many more.  There is no VNC
filter already made, you have to put similar regex to what we commented
in a new filter definition.
-- 
René Berber


------------------------------------------------------------------------------
This SF.net email is sponsored by 

Make an app they can't live without
Enter the BlackBerry Developer Challenge
http://p.sf.net/sfu/RIM-dev2dev 
_______________________________________________
Denyhosts-user mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/denyhosts-user

Reply via email to