Thanks. I'm sure you'll keep us posted! :)

Sebastian Grewe wrote:
> After checking out the code in that script I think it might be easier
> for me to just start on my script and extend it's functionality to look
> for all lines in those logfiles instead of just spamdyke.
> 
> I will see what I can do.
> 
> Cheers,
> Sebastian
> 
> Eric Shubert wrote:
>> Sorry to say that I haven't had a chance to check out your script yet, 
>> Sebastian. :(
>>
>> Speaking of colored and filtered qmail logfiles though, there's a nice 
>> 'qmlog' script at qtp.qmailtoaster.com (part of the qmailtoaster-plus 
>> package). It allows easy viewing and searching of qmail (et al) logs. 
>> I'm wondering if your 'coloring and filtering' might be a nice 
>> enhancement to that script. Care to have a look into it?
>>
>> Sebastian Grewe wrote:
>>   
>>> I totally forgot about that - but I am not using the script to block
>>> them forever, just to monitor qmail when a large amount of connections
>>> is coming in (which happens ever so often). Even so I did turn off
>>> the blocking feature since qmail handles it just fine and connections
>>> clear up after a while. I was just concerned that legitimate e-mail 
>>> wouldn't
>>> be coming through - but since they try to resend if no connection could
>>> be established that's not a concern anymore.
>>>
>>> So yeah, I use it to see what's being blocked and for what reason - even
>>> added whitelist matches now.
>>>
>>> It's basically just colored and filtered output of your qmail logfiles 
>>> now :D
>>>
>>> Cheers,
>>> Sebastian
>>>
>>> Otto Berger wrote:
>>>     
>>>> you could also use fail2ban for that. You just have to specify a custom
>>>> rule ("filter") for the spamdyke-log output. Then the sender ip will be
>>>> released after a specified timeframe and not blocked forever ;).
>>>>
>>>> (IMHO it is still not a very good idea to block by firewall)
>>>>
>>>> Otto
>>>>
>>>> Sebastian Grewe schrieb:
>>>>   
>>>>       
>>>>> Hey Guys,
>>>>>
>>>>> I have been working on a simple bash script that will read from it's
>>>>> standard input and presents some statistics from the logfile in realtime
>>>>> (when used with "tail -f .." ).
>>>>> After a few days that we have been attacked by spambots I got curious
>>>>> how to avoid these things in the future. The script we use is able to
>>>>> count the denied connections
>>>>> per IP and, if desired, adds this IP to the Firewall to reject incoming
>>>>> connections (brutal, I know). As the firewalling is optional you might
>>>>> still be interested in it to run just
>>>>> to see what's going on.
>>>>>
>>>>> It's written for BASH 3.0.15 but with a little change in the pattern
>>>>> matcher it runs on higher versions too. To start it in live mode run it
>>>>> like this:
>>>>>
>>>>>  tail -f /var/log/qmail/smtp/current | qmail_parser.sh
>>>>>
>>>>> and if you just want to scan some files and see what happened to this:
>>>>>
>>>>>  cat /var/log/qmail/smtp/* | qmail_parser.sh
>>>>>
>>>>> Since it's BASH it's not very good when it comes to performance but does
>>>>> the trick well when used with "tail". Also it's not catching everything
>>>>> (yet) since I was looking for only
>>>>> some very specific lines in the logfile. Anyhow, try it out and tell me
>>>>> what you think - attached the current script to this mail.
>>>>>
>>>>> Cheers,
>>>>> Sebastian
>>>>>
>>>>>
>>>>> ------------------------------------------------------------------------
>>>>>
>>>>> _______________________________________________
>>>>> spamdyke-users mailing list
>>>>> spamdyke-users@spamdyke.org
>>>>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>>>>     
>>>>>         
>>>> _______________________________________________
>>>> spamdyke-users mailing list
>>>> spamdyke-users@spamdyke.org
>>>> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>>>>   
>>>>       
>>
>>   


-- 
-Eric 'shubes'

_______________________________________________
spamdyke-users mailing list
spamdyke-users@spamdyke.org
http://www.spamdyke.org/mailman/listinfo/spamdyke-users

Reply via email to