i have been researching for alternatives. it is latest centos 4 (4.7) and uses vsftpd 2.01 started (again) investigating possible PAM or PAM module way... Q: is there a PAM way to control repeated crack retires on vsftpd? possibly something that can be done in /etc/pam.d/vsftpd i have been looking for a solution other than fail2ban and/or similar methods using hosts.allow and hosts.deny or iptables specifically, i am trying to stop repeated access to vsftpd after more than x attempts from the same ip address.... thanks in advance for any pointers.. - rh
of course, replying to own post. gigegigegige-------- ;-> what i found was pam_abl http://www.hexten.net/wiki/index.php/Pam_abl it is in dag land. search for pam_abl dag rpm does anyone have an experience they are willing to share with the group re: pam_abl ? thanks in advance - rh
RobertH wrote on Sun, 1 Mar 2009 22:04:23 -0800:> specifically, i am trying to stop repeated access to vsftpd after more than > x attempts from the same ip address....You can reduce the number of concurrent connections. This pretty much dumps all brute force attempts. You could also try ratelimiting to port 21 like with ssh. I've never tried that approach. Kai -- Kai Sch?tzl, Berlin, Germany Get your web at Conactive Internet Services: http://www.conactive.com