similar to: proper usage of global variables / node variables / +=

Displaying 20 results from an estimated 200 matches similar to: "proper usage of global variables / node variables / +="

2006 Jan 09
0
Re: Logcheck-users Digest, Vol 5, Issue 1
The entry is probably not igored because of the word deny in your path . You might better set your rule in violation.ignore.d/ directory. At 13:00 09/01/2006, you wrote: >Send Logcheck-users mailing list submissions to > logcheck-users@lists.alioth.debian.org > >To subscribe or unsubscribe via the World Wide Web, visit >
2009 Aug 26
1
denyhosts configuration
Hello, I've installed denyhosts on centos 5.3 trying to block automated attacks on ssh. It appears to be working in that entries are being added to /etc/hosts.deny yet the daily emails sent from denyhosts show only one ip being added perday when the total is many more than that. My config is below, i've gone over it and am not seeing what i missed. Suggestions welcome. I was also
2017 Oct 15
0
denyhosts-2.9-4.el7 not resync'ing
Everyone, It is apparent that the epel version of denyhosts on Centos 7 which is denyhosts-2.9-4.el7.noarch does not resynch with : SYNC_SERVER = http://xmlrpc.denyhosts.net:9911 According to : https://www.centos.org/forums/viewtopic.php?f=51&t=56989 the problem is related to a version update problem in the epel repositories. I submitted a bugzilla report :
2009 Jul 09
3
Looking for recommendations for blocking hacking attempts
Hello: I have been looking into projects that will automatically restrict hacking attempts on my servers running CentOS 5. I think the two top contenders are: DenyHosts - http://denyhosts.sourceforge.net Fail2ban - http://www.fail2ban.org >From what I see, DenyHosts only blocks based on failed SSH attempts whereas Fail2ban blocks failed attempts for other access as well. The main benefit
2012 Jul 24
3
Adding resource parameters in inheritence
Hello, On some machines being managed by Puppet I would like to perform targetted audit runs with "puppet -t --noop --tags audit" For better or for worse I am trying to do this with a separate module "audit" rather than add the audit => to the resources and use inheritence. i.e. class audit::resolver inherits resolver::config { notify{"Running audit on
2006 Aug 30
3
No tcp wrappers, other ideas to help stop brute force attacks?
I'm looking for a way to deny access to dovecot from certain IP addresses, basically to help prevent brute force attacks on the server. Right now I'm using denyhosts which scans /var/log/secure for authentication failures which then can add an entry to /etc/hosts.deny, but since dovecot doesn't have tcp wrappers support, that doesn't do anything. It doesn't look like I can
2010 Apr 19
1
no logging in auth.log when using wrong ssh keys
I have in the sshd_config the following to disable password authentication Match Group dummies PasswordAuthentication no KbdInteractive no Normally I use denyhosts to detect incorrect logins, but it seems that failed sshkey logins are not logged in auth.log And I really like to have them in order to detect them and use the denyhosts script. Looked in the last nightly builds, but it
2007 Sep 26
4
Intrusion Detection Systems
Situation: We are providing hosting services. I've grown tired of the various kiddie scripts/dictionary attacks on various services. The latest has been against vsftpd, on systems that I can't easily control vs. putting strict limits on ssh. We simply have too many users entering from too many networks many with dynamic IP addresses. Enter.... thinking about LIDS or Log Based
2001 Feb 27
4
AllowHosts / DenyHosts
I'd like to see a feature of the commercial ssh in openssh: AllowHosts xxx.yyy.xxx.yyy *.domain.net DenyHosts xxx.yyy.xxx.* name.domain.net This allows or denies connects from certain machines (including wildcard matching). Is there any chance for this feature to be included? No, we don't want to use tcp-wrapper for this. Bye.
2007 Oct 02
1
denyhosts
Hi, My denyhosts stop working. How do i check why isnt it working anymore for me? Thanks Oct 2 22:59:17 beyond sshd[15690]: Failed password for root from 221.7.37.142 port 49836 ssh2 Oct 2 22:59:17 beyond sshd[15692]: Received disconnect from 221.7.37.142: 11: Bye Bye Oct 2 22:59:18 beyond sshd[15701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser=
2007 Mar 13
4
Centos-specific Denyhosts Howto Anyone?
Hi, after reading the docs (no man page) and seeing a few example howtos, I see none for Centos specifically. I hereby offer to write this and even host it, and any other wiki-able howto you want, if you can school me on the first few steps relevant to how to link up the current rpmforge rpm for RHEL4-64. See, right now, the one for centos loads into the /usr/share/doc, which is an odd place
2008 Jan 21
5
denyhosts-like app for MySQLd?
Hi all, ?Is there any app like denyhosts[1] but intended for MySQLd service? We have a mysql ports (3306) opened for remote connections, and obviously the /var/db/mysql/machine_name.log is full of these kind of entries: ........... 936012 Connect Access denied for user 'user'@'85.19.95.10' (using password: YES) 936013 Connect Access denied for user
2016 Apr 27
0
R Script Template
The subject of your email is missing. Perhaps you need to read the Posting Guide (again?) about attachments. Embedding your example directly in the body of the email is generally more accessible in archives than attaching it. -- Sent from my phone. Please excuse my brevity. On April 27, 2016 1:14:17 PM GMT+01:00, G.Maubach at gmx.de wrote: >Hi All, > >I am addressing this post to all
2010 Jan 16
0
Processed: tag ipv6 related packages
Processing commands for control at bugs.debian.org: > # Tagging bugs related to IPv6 support according to bug title (and checked for false positive) > # Maintainer, sorry if you consider the tag as not relevant > tag 561835 +ipv6 Bug #561835 [openjdk-6-jdk] josm: net.ipv6.bindv6only=1 breaks OSM access Added tag(s) ipv6. > tag 560837 +ipv6 Bug #560837 {Done: Krzysztof Krzy??aniak
2010 Jan 16
0
Processed: tag ipv6 related packages
Processing commands for control at bugs.debian.org: > # Tagging bugs related to IPv6 support according to bug title (and checked for false positive) > # Maintainer, sorry if you consider the tag as not relevant > tag 561835 +ipv6 Bug #561835 [openjdk-6-jdk] josm: net.ipv6.bindv6only=1 breaks OSM access Added tag(s) ipv6. > tag 560837 +ipv6 Bug #560837 {Done: Krzysztof Krzy??aniak
2009 Aug 20
5
protecting multiuser systems from bruteforce ssh attacks
Hello, What is the best way to protect multiuser systems from brute force attacks? I am setting up a relatively loose DenyHosts policy, but I like the idea of locking an account for a time if too many attempts are made, but to balance this with keeping the user from making a helpdesk call. What are some policies/techniques that have worked for this list with minimal hassle? Thanks! -Eugene
2016 Apr 27
2
R Script Template
Hi All, I am addressing this post to all who are new to R. When learing R in the last weeks I took some notes for myself to have code snippets ready for the data analysis process. I put these snippets together as a script template for future use. Almost all of the given command prototypes are tested. The template script contains snippets for best practices and leaves out the commands that
2010 Feb 04
1
proftpd wrap
Hi, My ftpd is being abused. Maximum login attempts exceeded from hosts: ::ffff:64.251.22.142[::ffff:64.251.22.142] : 24197 Time(s) I had came across an article stating that proftpd with mod wrap can actually block these IP using denyhosts. I had googled but I did not see any proftpd rpm with mod wrap. Is there anyone with a copy would like to share? Or can someone share a spec file, so I
2009 Nov 04
0
The error occurred while evaluating nil.prefetch_primary_key
The error occurred while evaluating nil.prefetch_primary_key? Hi, I have a problem with a model when I have 3 belongs_to relations in one the middle. This example is a subset of a grid-routing project: n 1 1 n +------------ Project Connection ------- ConnectionCost +------------ WaySearchRun
2006 Mar 20
6
[OT maybe] netcafe firewall
Hi all, I appologise in advance if this is a little OT, but I am building a box that will serve as firewall and router for a small ''internet cafe / netcafe'' and am using CentOS... So here it is: What are the best tools to be used for keeping the potential script kiddies from ''harming the Internet'' :) ? I specifically want to be able to detect and prevent