[BlueOnyx:11981] Re: Forbidden Page After Installing A/V Packages

2013-01-10 Thread David Hahn

On 1/10/2013 10:09 PM, Michael Stauber wrote:

Hi David,


You do not have permission to access the requested file on this server.
is what I get after installing A/V via bluelinq.

Any Ideas where to look for the problem..
the stats page seems to work...

Run this command from SSH as "root":

/etc/init.d/cced.init restart

Afterwards and for good measure also run this two commands:

/usr/sausalito/constructor/solarspeed/av_spam/aa_initial_inst.pl
/usr/sausalito/constructor/solarspeed/av_spam/update_spamfilter_info.pl

Then it should work.


Thank you
I did and that part of the GUI now works but now i get this in webmail

*Notice*: Undefined variable: charset_converted in 
*/usr/share/squirrelmail/functions/mime.php* on line *316*


*Notice*: Undefined variable: charset in 
*/usr/share/squirrelmail/functions/mime.php* on line *317*


*Notice*: Undefined variable: charset in 
*/usr/share/squirrelmail/functions/mime.php* on line *317*


*Notice*: Undefined variable: charset in 
*/usr/share/squirrelmail/functions/mime.php* on line *317*


*Warning*: Cannot modify header information - headers already sent by 
(output started at /usr/share/squirrelmail/functions/mime.php:316) in 
*/usr/share/squirrelmail/functions/page_header.php* on line *31*


any ideas on that?
Thanks
David
___
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx


[BlueOnyx:11980] Re: Forbidden Page After Installing A/V Packages

2013-01-10 Thread Michael Stauber
Hi David,

> You do not have permission to access the requested file on this server.
> is what I get after installing A/V via bluelinq.
> 
> Any Ideas where to look for the problem..
> the stats page seems to work...

Run this command from SSH as "root":

/etc/init.d/cced.init restart

Afterwards and for good measure also run this two commands:

/usr/sausalito/constructor/solarspeed/av_spam/aa_initial_inst.pl
/usr/sausalito/constructor/solarspeed/av_spam/update_spamfilter_info.pl

Then it should work.

-- 
With best regards

Michael Stauber
___
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx


[BlueOnyx:11979] Forbidden Page After Installing A/V Packages

2013-01-10 Thread David Hahn
Help!
You do not have permission to access the requested file on this server.
is what I get after installing A/V via bluelinq.

Any Ideas where to look for the problem..
the stats page seems to work...

TIA
David
___
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx


[BlueOnyx:11978] Re: Spam Anti-Virus Solution For 5106R

2013-01-10 Thread David Hahn

On 1/10/2013 2:41 PM, James wrote:


Yep -- AV-SPAM will install through newlinq.  I just installed it on 
mine a couple days ago.


*From:*blueonyx-boun...@mail.blueonyx.it 
[mailto:blueonyx-boun...@mail.blueonyx.it] *On Behalf Of *David Hahn

*Sent:* Thursday, January 10, 2013 5:29 PM
*To:* BlueOnyx General Mailing List
*Subject:* [BlueOnyx:11974] Re: Spam Anti-Virus Solution For 5106R

On 1/10/2013 1:38 PM, Maurice de Laat wrote:

On Thu, Jan 10, 2013 at 01:45:43PM -0600, Chris Gebhardt - VIRTBIZ Internet 
wrote:

  


2. External MX gateway used as "spam firewall".  There are several

providers of this as a hosted service (MXLogic, Postini, VIRTBIZ) or as

a hardware device (Barracuda, Ironport).

  


I don't recommend this because of the false non deliverables this solution

often produces.

  


Also, when taking this route, it is recommended to use appropiate

firewall rules to accept only incoming connections on port 25 originating

from your MX gateway, in order to prevent A-record spam.

So installing the a/v package looks like the best option.. Is this 
something i can install through newlinq?

Wonder if it can scan the existing inbox mail after its installed?
Thanks
David



___
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx

How long does it take to get the package once its paid for and where do I Go
to download it? I bought it but can't find where to download it.. Any ideas?
TIA
David
___
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx


[BlueOnyx:11977] Re: Spam Anti-Virus Solution For 5106R

2013-01-10 Thread David Hahn
On 1/10/2013 3:05 PM, Chris Gebhardt - VIRTBIZ Internet wrote:
> On 1/10/2013 4:28 PM, David Hahn wrote:
>> So installing the a/v package looks like the best option.. Is this
>> something i can install through newlinq?
>> Wonder if it can scan the existing inbox mail after its installed?
> AV-SPAM, in a word, rocks.
> NewLinq installation should go easily enough for you.
>
> Once the email is in a box, it won't be scanned.  AV-SPAM uses
> SpamAssassin in a milter to scan email as it hits the MTA.  After it
> passes through, it's through.
>
I'm sold...Where are the instructions to get a password or store
I not sure where to get it or how...? How to pay or how that works..
David
___
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx


[BlueOnyx:11976] Re: Spam Anti-Virus Solution For 5106R

2013-01-10 Thread Chris Gebhardt - VIRTBIZ Internet

On 1/10/2013 4:28 PM, David Hahn wrote:
> So installing the a/v package looks like the best option.. Is this
> something i can install through newlinq?
> Wonder if it can scan the existing inbox mail after its installed?

AV-SPAM, in a word, rocks.
NewLinq installation should go easily enough for you.

Once the email is in a box, it won't be scanned.  AV-SPAM uses 
SpamAssassin in a milter to scan email as it hits the MTA.  After it 
passes through, it's through.

-- 
Chris Gebhardt
VIRTBIZ Internet Services
Access, Web Hosting, Colocation, Dedicated
www.virtbiz.com | toll-free (866) 4 VIRTBIZ
___
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx


[BlueOnyx:11975] Re: Spam Anti-Virus Solution For 5106R

2013-01-10 Thread James
Yep - AV-SPAM will install through newlinq.  I just installed it on mine a
couple days ago.

 

From: blueonyx-boun...@mail.blueonyx.it
[mailto:blueonyx-boun...@mail.blueonyx.it] On Behalf Of David Hahn
Sent: Thursday, January 10, 2013 5:29 PM
To: BlueOnyx General Mailing List
Subject: [BlueOnyx:11974] Re: Spam Anti-Virus Solution For 5106R

 

On 1/10/2013 1:38 PM, Maurice de Laat wrote:

On Thu, Jan 10, 2013 at 01:45:43PM -0600, Chris Gebhardt - VIRTBIZ Internet
wrote:
 

2. External MX gateway used as "spam firewall".  There are several 
providers of this as a hosted service (MXLogic, Postini, VIRTBIZ) or as 
a hardware device (Barracuda, Ironport).

 
I don't recommend this because of the false non deliverables this solution 
often produces.
 
Also, when taking this route, it is recommended to use appropiate 
firewall rules to accept only incoming connections on port 25 originating 
from your MX gateway, in order to prevent A-record spam.

So installing the a/v package looks like the best option.. Is this something
i can install through newlinq?
Wonder if it can scan the existing inbox mail after its installed?
Thanks
David

___
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx


[BlueOnyx:11974] Re: Spam Anti-Virus Solution For 5106R

2013-01-10 Thread David Hahn

On 1/10/2013 1:38 PM, Maurice de Laat wrote:

On Thu, Jan 10, 2013 at 01:45:43PM -0600, Chris Gebhardt - VIRTBIZ Internet 
wrote:


2. External MX gateway used as "spam firewall".  There are several
providers of this as a hosted service (MXLogic, Postini, VIRTBIZ) or as
a hardware device (Barracuda, Ironport).

I don't recommend this because of the false non deliverables this solution
often produces.

Also, when taking this route, it is recommended to use appropiate
firewall rules to accept only incoming connections on port 25 originating
from your MX gateway, in order to prevent A-record spam.
So installing the a/v package looks like the best option.. Is this 
something i can install through newlinq?

Wonder if it can scan the existing inbox mail after its installed?
Thanks
David
___
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx


[BlueOnyx:11973] Re: Spam Anti-Virus Solution For 5106R

2013-01-10 Thread David Hahn
On 1/10/2013 12:54 PM, Richard Barker wrote:
> Yes both Solarspeed and Compass do.
> I use there's and works perfect.
> RC
>
Did you install it from the gui or how does it come?
David
___
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx


[BlueOnyx:11972] Re: Spam Anti-Virus Solution For 5106R

2013-01-10 Thread Maurice de Laat
On Thu, Jan 10, 2013 at 01:45:43PM -0600, Chris Gebhardt - VIRTBIZ Internet 
wrote:

> 2. External MX gateway used as "spam firewall".  There are several 
> providers of this as a hosted service (MXLogic, Postini, VIRTBIZ) or as 
> a hardware device (Barracuda, Ironport).

I don't recommend this because of the false non deliverables this solution 
often produces.

Also, when taking this route, it is recommended to use appropiate 
firewall rules to accept only incoming connections on port 25 originating 
from your MX gateway, in order to prevent A-record spam.
-- 
Maurice de Laat
___
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx


[BlueOnyx:11971] Re: Spam Anti-Virus Solution For 5106R

2013-01-10 Thread Richard Barker
Yes both Solarspeed and Compass do.
I use there's and works perfect.
RC

-- 
+-+
  Richard C. Barker Sr.
  CEO & President
  1-800-510-3139
  ProBass Networks Inc.
http://www.probassnetworks.net
http://www.probass.net
  ***
  DISCLAIMER : -
  This e-mail is confidential and intended only for the use
  of the individual or entity named above and may contain
  information that is privileged. If you are not the intended
  recipient, you are notified that any dissemination, distribution
  or copying of this e-mail is strictly prohibited. If you have
  received this email in error, please notify us immediately
  by return email or telephone and destroy the original message.
+-+

___
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx


[BlueOnyx:11970] Re: Blocking brute force SSH login attempts

2013-01-10 Thread David Hahn

On 1/10/2013 4:09 AM, Greg Kuhnert wrote:

DFIX is available for all versions of Blueonyx.

Regards,
Greg.


On 10/01/2013, at 9:22 PM, Steffan > wrote:



Hello Greg,
Is the DFIX allready for 5107, in the past ity only worked on 5106
Thanxs

Steffan
*Van:*blueonyx-boun...@mail.blueonyx.it 
[mailto:blueonyx-boun...@mail.blueonyx.it 
]*Namens*Greg Kuhnert

*Verzonden:*woensdag 9 januari 2013 20:43
*Aan:*BlueOnyx General Mailing List
*Onderwerp:*[BlueOnyx:11954] Re: Blocking brute force SSH login attempts
DFIX is a free product available from the new combined Compass / 
BlueOnyx / Solarspeed stores. It blocks SSH brute force attacks and 
much more. To get DFIX, you will need to register to one of the 
stores if you have not already done so, and "purchase" the free 
bundle for $0. You can then install via NewLinQ.
Note: Anyone who has previously had an account with either Solarspeed 
or Compass, you should first try to reset your password in the new 
store - and then connect to NewLinQ using the instructions at the 
link below. It is important for all clients to perform this step to 
get access to any updates/patches for any of your purchases.
The instructions to connect to NewLinQ are here. 
http://www.compassnetworks.com.au/delivery

Regards,
Greg.
On 10/01/2013, at 1:14 AM, Fungal Style > wrote:



As far as I know... yes and no

BO will block accounts and IPs that are attempted to be brute 
forced, but the account needs to exist, well that has been my 
experience


I tend to use the iptables and block /32 or if it is from China or 
other known hacking countries then a /24 is a minimum...


I have been thinking of routing everything through a firewall or 
sorts so that the hackers will usually hit it first then get the IP 
blocked (as all other servers would be on a virtual LAN)... or 
something like that but it needs more thought at this stage and I 
just dont have the time to look too far into it.


If anyone has a good solution (preferrably free) then I am open to 
suggestions too (much like most on this list I would assume).


HTH

Brian


From:ja...@slor.net 
To:blueo...@blueonyx.it 
Date: Wed, 9 Jan 2013 09:07:31 -0500
Subject: [BlueOnyx:11940] Blocking brute force SSH login attempts

Is there a simple way in BlueOnyx to auto-block hosts that fail to 
login via SSH too many times?  Something similar to the Failed Logins 
settings for the BlueOnyx login page but for SSH?

thanks

___ Blueonyx mailing 
listblueo...@mail.blueonyx.it 
http://mail.blueonyx.it/mailman/listinfo/blueonyx

___
Blueonyx mailing list
Blueonyx@mail.blueonyx.it 
http://mail.blueonyx.it/mailman/listinfo/blueonyx
___
Blueonyx mailing list
Blueonyx@mail.blueonyx.it 
http://mail.blueonyx.it/mailman/listinfo/blueonyx




___
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx

I like that firewall rule G.
I block all ftp and shell access in hosts.deny and install a little php 
script I made in each user /~web when
the domain is created. If valid users need ftp or shell access they 
login to their user web
and the ip address is captured and put in hosts.allow it tracks their ip 
and if it changes
they just revisit their web dir. then any attackers I find in logwatch 
get put in iptables.

Its a sloppy way to control access but works..
David
___
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx


[BlueOnyx:11969] Re: cmuExport/cmuImport and subdomains

2013-01-10 Thread James
> > Is there some trick I'm missing to getting subdomains successfully
> > exported and imported?  I'm moving stuff from 5106R on old crappy host
> > to 5108R on new shiny host, and everything seems to be getting there
> > fine except for subdomain configuration.  All my files are there, all
> > settings for the main sites look good, etc., and subdomains are
> > enabled in the general settings on the new host.  I don't know if I'm
> > losing them in the export or import step, but I'd sure like to find
> > them. J
> 
> IIRC, there is an issue with subdomains from older BlueQuartz or
> BlueOnyx (ie 5106R or older) and CMU.   It has something to do with the
> subdomain functionality being hacked onto the older boxes, but the
> structure was changed with 5107/5108R.   I don't *think* I'm making that
up.
> 
> Somebody else may want to chime in here, but the best bet may be to
> manually roll in the subdomains if you don't have too many of them.
> 

Only other oddity I've found so far in my migration is that none of my
server aliases worked properly on the new machine.  They were in the BO
config but hadn't made their way to the siteXX httpd.conf includes.  Doing a
fake update and then reverting back from the UI seemed  to clean it up for
me.

___
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx


[BlueOnyx:11968] Re: Spam Anti-Virus Solution For 5106R

2013-01-10 Thread Jeff Folk
On Jan 10, 2013, at 2:16 PM, David Hahn wrote:

> On 1/10/2013 11:45 AM, Chris Gebhardt - VIRTBIZ Internet wrote:
>> 
>> On 1/10/2013 1:40 PM, David Hahn wrote:
>>> Hi List,
>>> Hope the holidays went well.
>>> Anyone know of a compatible anti-virus and mail scanner solution
>>> or filter service for email that won't break the bank or the 5106..?
>> 
>> 2 good options:
>> 
>> 1. Solarspeed AV-SPAM, available from Solarspeed, Compass or the new 
>> BlueOnyx Shop.
>> 
>> 2. External MX gateway used as "spam firewall".  There are several 
>> providers of this as a hosted service (MXLogic, Postini, VIRTBIZ) or 
>> as a hardware device (Barracuda, Ironport).
>> 
> I had a customer tell me that postini won't do a third party is there 
> any truth to that?

Google acquired them in 2007… I think it has been retired.
___
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx


[BlueOnyx:11967] Re: Spam Anti-Virus Solution For 5106R

2013-01-10 Thread David Hahn
On 1/10/2013 11:45 AM, Chris Gebhardt - VIRTBIZ Internet wrote:
>
> On 1/10/2013 1:40 PM, David Hahn wrote:
>> Hi List,
>> Hope the holidays went well.
>> Anyone know of a compatible anti-virus and mail scanner solution
>> or filter service for email that won't break the bank or the 5106..?
>
> 2 good options:
>
> 1. Solarspeed AV-SPAM, available from Solarspeed, Compass or the new 
> BlueOnyx Shop.
>
> 2. External MX gateway used as "spam firewall".  There are several 
> providers of this as a hosted service (MXLogic, Postini, VIRTBIZ) or 
> as a hardware device (Barracuda, Ironport).
>
I had a customer tell me that postini won't do a third party is there 
any truth to that?
___
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx


[BlueOnyx:11966] Re: Spam Anti-Virus Solution For 5106R

2013-01-10 Thread webmaster
On 1/10/2013 1:45 PM, Chris Gebhardt - VIRTBIZ Internet wrote:
> On 1/10/2013 1:40 PM, David Hahn wrote:
>> Hi List,
>> Hope the holidays went well.
>> Anyone know of a compatible anti-virus and mail scanner solution
>> or filter service for email that won't break the bank or the 5106..?
> 2 good options:
>
> 1. Solarspeed AV-SPAM, available from Solarspeed, Compass or the new 
> BlueOnyx Shop.
>
> 2. External MX gateway used as "spam firewall".  There are several 
> providers of this as a hosted service (MXLogic, Postini, VIRTBIZ) or as 
> a hardware device (Barracuda, Ironport).


Don't forget about RBL's and spamassissin
They are pretty much "getting me by" right now.

If I wasn't so cheap and had a bit more $$ in my pocket I would go with
option 1 above!

I would do everything via the various crew(s) listed in 1 above, again
if I had more $$.











___
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx


[BlueOnyx:11965] Re: Spam Anti-Virus Solution For 5106R

2013-01-10 Thread Chris Gebhardt - VIRTBIZ Internet

On 1/10/2013 1:40 PM, David Hahn wrote:
> Hi List,
> Hope the holidays went well.
> Anyone know of a compatible anti-virus and mail scanner solution
> or filter service for email that won't break the bank or the 5106..?

2 good options:

1. Solarspeed AV-SPAM, available from Solarspeed, Compass or the new 
BlueOnyx Shop.

2. External MX gateway used as "spam firewall".  There are several 
providers of this as a hosted service (MXLogic, Postini, VIRTBIZ) or as 
a hardware device (Barracuda, Ironport).

-- 
Chris Gebhardt
VIRTBIZ Internet Services
Access, Web Hosting, Colocation, Dedicated
www.virtbiz.com | toll-free (866) 4 VIRTBIZ
___
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx


[BlueOnyx:11964] Spam Anti-Virus Solution For 5106R

2013-01-10 Thread David Hahn
Hi List,
Hope the holidays went well.
Anyone know of a compatible anti-virus and mail scanner solution
or filter service for email that won't break the bank or the 5106..?

TIA
David
___
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx


[BlueOnyx:11963] Re: Blocking brute force SSH login attempts

2013-01-10 Thread Greg Kuhnert
DFIX is available for all versions of Blueonyx.

Regards,
Greg.


On 10/01/2013, at 9:22 PM, Steffan  wrote:

> Hello Greg,
>  
> Is the DFIX allready for 5107, in the past ity only worked on 5106
>  
>  
> Thanxs
> 
> Steffan
>  
> Van: blueonyx-boun...@mail.blueonyx.it 
> [mailto:blueonyx-boun...@mail.blueonyx.it] Namens Greg Kuhnert
> Verzonden: woensdag 9 januari 2013 20:43
> Aan: BlueOnyx General Mailing List
> Onderwerp: [BlueOnyx:11954] Re: Blocking brute force SSH login attempts
>  
> DFIX is a free product available from the new combined Compass / BlueOnyx / 
> Solarspeed stores. It blocks SSH brute force attacks and much more. To get 
> DFIX, you will need to register to one of the stores if you have not already 
> done so, and "purchase" the free bundle for $0. You can then install via 
> NewLinQ.
>  
> Note: Anyone who has previously had an account with either Solarspeed or 
> Compass, you should first try to reset your password in the new store - and 
> then connect to NewLinQ using the instructions at the link below. It is 
> important for all clients to perform this step to get access to any 
> updates/patches for any of your purchases.
>  
> The instructions to connect to NewLinQ are here. 
> http://www.compassnetworks.com.au/delivery
>  
> Regards,
> Greg.
>  
>  
> On 10/01/2013, at 1:14 AM, Fungal Style  wrote:
> 
> 
> As far as I know... yes and no
>  
> BO will block accounts and IPs that are attempted to be brute forced, but the 
> account needs to exist, well that has been my experience
>  
> I tend to use the iptables and block /32 or if it is from China or other 
> known hacking countries then a /24 is a minimum... 
>  
> I have been thinking of routing everything through a firewall or sorts so 
> that the hackers will usually hit it first then get the IP blocked (as all 
> other servers would be on a virtual LAN)... or something like that but it 
> needs more thought at this stage and I just dont have the time to look too 
> far into it.
>  
> If anyone has a good solution (preferrably free) then I am open to 
> suggestions too (much like most on this list I would assume).
>  
> HTH
>  
> Brian
>  
> From: ja...@slor.net
> To: blueo...@blueonyx.it
> Date: Wed, 9 Jan 2013 09:07:31 -0500
> Subject: [BlueOnyx:11940] Blocking brute force SSH login attempts
> 
> Is there a simple way in BlueOnyx to auto-block hosts that fail to login via 
> SSH too many times?  Something similar to the Failed Logins settings for the 
> BlueOnyx login page but for SSH?
>  
> thanks
> 
> ___ Blueonyx mailing list 
> Blueonyx@mail.blueonyx.ithttp://mail.blueonyx.it/mailman/listinfo/blueonyx
> ___
> Blueonyx mailing list
> Blueonyx@mail.blueonyx.it
> http://mail.blueonyx.it/mailman/listinfo/blueonyx
>  
> ___
> Blueonyx mailing list
> Blueonyx@mail.blueonyx.it
> http://mail.blueonyx.it/mailman/listinfo/blueonyx

___
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx


[BlueOnyx:11962] Re: Blocking brute force SSH login attempts

2013-01-10 Thread Steffan
Hello Greg,

 

Is the DFIX allready for 5107, in the past ity only worked on 5106

 

 

Thanxs


Steffan

 

Van: blueonyx-boun...@mail.blueonyx.it
[mailto:blueonyx-boun...@mail.blueonyx.it] Namens Greg Kuhnert
Verzonden: woensdag 9 januari 2013 20:43
Aan: BlueOnyx General Mailing List
Onderwerp: [BlueOnyx:11954] Re: Blocking brute force SSH login attempts

 

DFIX is a free product available from the new combined Compass / BlueOnyx /
Solarspeed stores. It blocks SSH brute force attacks and much more. To get
DFIX, you will need to register to one of the stores if you have not already
done so, and "purchase" the free bundle for $0. You can then install via
NewLinQ.

 

Note: Anyone who has previously had an account with either Solarspeed or
Compass, you should first try to reset your password in the new store - and
then connect to NewLinQ using the instructions at the link below. It is
important for all clients to perform this step to get access to any
updates/patches for any of your purchases.

 

The instructions to connect to NewLinQ are here.
http://www.compassnetworks.com.au/delivery

 

Regards,

Greg.

 

 

On 10/01/2013, at 1:14 AM, Fungal Style  wrote:





As far as I know... yes and no
 
BO will block accounts and IPs that are attempted to be brute forced, but
the account needs to exist, well that has been my experience
 
I tend to use the iptables and block /32 or if it is from China or other
known hacking countries then a /24 is a minimum... 
 
I have been thinking of routing everything through a firewall or sorts so
that the hackers will usually hit it first then get the IP blocked (as all
other servers would be on a virtual LAN)... or something like that but
it needs more thought at this stage and I just dont have the time to look
too far into it.
 
If anyone has a good solution (preferrably free) then I am open to
suggestions too (much like most on this list I would assume).
 
HTH
 
Brian
 

  _  

From: ja...@slor.net
To: blueo...@blueonyx.it
Date: Wed, 9 Jan 2013 09:07:31 -0500
Subject: [BlueOnyx:11940] Blocking brute force SSH login attempts

Is there a simple way in BlueOnyx to auto-block hosts that fail to login via
SSH too many times?  Something similar to the Failed Logins settings for the
BlueOnyx login page but for SSH?

 

thanks


___ Blueonyx mailing list
Blueonyx@mail.blueonyx.ithttp://mail.blueonyx.it/mailman/listinfo/blueonyx

___
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx

 

___
Blueonyx mailing list
Blueonyx@mail.blueonyx.it
http://mail.blueonyx.it/mailman/listinfo/blueonyx