Displaying 20 results from an estimated 200 matches similar to: "proper usage of global variables / node variables / +="
2006 Jan 09
0
Re: Logcheck-users Digest, Vol 5, Issue 1
The entry is probably not igored because of
the word deny in your path .
You might better set your rule in violation.ignore.d/ directory.
At 13:00 09/01/2006, you wrote:
>Send Logcheck-users mailing list submissions to
> logcheck-users@lists.alioth.debian.org
>
>To subscribe or unsubscribe via the World Wide Web, visit
>
2009 Aug 26
1
denyhosts configuration
Hello,
I've installed denyhosts on centos 5.3 trying to block automated
attacks on ssh. It appears to be working in that entries are being added to
/etc/hosts.deny yet the daily emails sent from denyhosts show only one ip
being added perday when the total is many more than that. My config is
below, i've gone over it and am not seeing what i missed. Suggestions
welcome.
I was also
2017 Oct 15
0
denyhosts-2.9-4.el7 not resync'ing
Everyone,
It is apparent that the epel version of denyhosts on Centos 7 which is
denyhosts-2.9-4.el7.noarch does not resynch with :
SYNC_SERVER = http://xmlrpc.denyhosts.net:9911
According to :
https://www.centos.org/forums/viewtopic.php?f=51&t=56989
the problem is related to a version update problem in the epel
repositories.
I submitted a bugzilla report :
2009 Jul 09
3
Looking for recommendations for blocking hacking attempts
Hello:
I have been looking into projects that will automatically
restrict hacking attempts on my servers running CentOS 5.
I think the two top contenders are:
DenyHosts - http://denyhosts.sourceforge.net
Fail2ban - http://www.fail2ban.org
>From what I see, DenyHosts only blocks based on failed
SSH attempts whereas Fail2ban blocks failed attempts
for other access as well.
The main benefit
2012 Jul 24
3
Adding resource parameters in inheritence
Hello,
On some machines being managed by Puppet I would like to perform targetted
audit runs with "puppet -t --noop --tags audit"
For better or for worse I am trying to do this with a separate module
"audit" rather than add the audit => to the resources and use inheritence.
i.e.
class audit::resolver inherits resolver::config {
notify{"Running audit on
2006 Aug 30
3
No tcp wrappers, other ideas to help stop brute force attacks?
I'm looking for a way to deny access to dovecot from certain IP
addresses, basically to help prevent brute force attacks on the
server.
Right now I'm using denyhosts which scans /var/log/secure for
authentication failures which then can add an entry to
/etc/hosts.deny, but since dovecot doesn't have tcp wrappers support,
that doesn't do anything.
It doesn't look like I can
2010 Apr 19
1
no logging in auth.log when using wrong ssh keys
I have in the sshd_config the following to disable password authentication
Match Group dummies
PasswordAuthentication no
KbdInteractive no
Normally I use denyhosts to detect incorrect logins, but it seems that
failed sshkey logins are not logged in auth.log
And I really like to have them in order to detect them and use the
denyhosts script.
Looked in the last nightly builds, but it
2007 Sep 26
4
Intrusion Detection Systems
Situation: We are providing hosting services.
I've grown tired of the various kiddie scripts/dictionary attacks on
various services. The latest has been against vsftpd, on systems that I
can't easily control vs. putting strict limits on ssh. We simply have
too many users entering from too many networks many with dynamic IP
addresses.
Enter.... thinking about LIDS or Log Based
2001 Feb 27
4
AllowHosts / DenyHosts
I'd like to see a feature of the commercial ssh in openssh:
AllowHosts xxx.yyy.xxx.yyy *.domain.net
DenyHosts xxx.yyy.xxx.* name.domain.net
This allows or denies connects from certain machines (including wildcard
matching).
Is there any chance for this feature to be included? No, we don't want to
use tcp-wrapper for this.
Bye.
2007 Oct 02
1
denyhosts
Hi,
My denyhosts stop working. How do i check why isnt it working anymore for
me?
Thanks
Oct 2 22:59:17 beyond sshd[15690]: Failed password for root from
221.7.37.142 port 49836 ssh2
Oct 2 22:59:17 beyond sshd[15692]: Received disconnect from 221.7.37.142:
11: Bye Bye
Oct 2 22:59:18 beyond sshd[15701]: pam_unix(sshd:auth): authentication
failure; logname= uid=0 euid=0 tty=ssh ruser=
2007 Mar 13
4
Centos-specific Denyhosts Howto Anyone?
Hi, after reading the docs (no man page) and seeing a few example
howtos, I see none for Centos specifically.
I hereby offer to write this and even host it, and any other wiki-able
howto you want, if you can school me on the first few steps relevant to
how to link up the current rpmforge rpm for RHEL4-64. See, right now,
the one for centos loads into the /usr/share/doc, which is an odd place
2008 Jan 21
5
denyhosts-like app for MySQLd?
Hi all,
?Is there any app like denyhosts[1] but intended for MySQLd service?
We have a mysql ports (3306) opened for remote connections, and
obviously the /var/db/mysql/machine_name.log is full of these kind of
entries:
...........
936012 Connect Access denied for user 'user'@'85.19.95.10' (using
password: YES)
936013 Connect Access denied for user
2016 Apr 27
0
R Script Template
The subject of your email is missing. Perhaps you need to read the Posting Guide (again?) about attachments. Embedding your example directly in the body of the email is generally more accessible in archives than attaching it.
--
Sent from my phone. Please excuse my brevity.
On April 27, 2016 1:14:17 PM GMT+01:00, G.Maubach at gmx.de wrote:
>Hi All,
>
>I am addressing this post to all
2010 Jan 16
0
Processed: tag ipv6 related packages
Processing commands for control at bugs.debian.org:
> # Tagging bugs related to IPv6 support according to bug title (and checked for false positive)
> # Maintainer, sorry if you consider the tag as not relevant
> tag 561835 +ipv6
Bug #561835 [openjdk-6-jdk] josm: net.ipv6.bindv6only=1 breaks OSM access
Added tag(s) ipv6.
> tag 560837 +ipv6
Bug #560837 {Done: Krzysztof Krzy??aniak
2010 Jan 16
0
Processed: tag ipv6 related packages
Processing commands for control at bugs.debian.org:
> # Tagging bugs related to IPv6 support according to bug title (and checked for false positive)
> # Maintainer, sorry if you consider the tag as not relevant
> tag 561835 +ipv6
Bug #561835 [openjdk-6-jdk] josm: net.ipv6.bindv6only=1 breaks OSM access
Added tag(s) ipv6.
> tag 560837 +ipv6
Bug #560837 {Done: Krzysztof Krzy??aniak
2009 Aug 20
5
protecting multiuser systems from bruteforce ssh attacks
Hello,
What is the best way to protect multiuser systems from brute force
attacks? I am setting up a relatively loose DenyHosts policy, but I
like the idea of locking an account for a time if too many attempts
are made, but to balance this with keeping the user from making a
helpdesk call.
What are some policies/techniques that have worked for this list with
minimal hassle?
Thanks!
-Eugene
2016 Apr 27
2
R Script Template
Hi All,
I am addressing this post to all who are new to R.
When learing R in the last weeks I took some notes for myself to have code snippets ready for the data analysis process. I put these snippets
together as a script template for future use. Almost all of the given command prototypes are tested. The template script contains snippets for best practices and leaves out the commands that
2010 Feb 04
1
proftpd wrap
Hi,
My ftpd is being abused.
Maximum login attempts exceeded from hosts:
::ffff:64.251.22.142[::ffff:64.251.22.142] : 24197 Time(s)
I had came across an article stating that proftpd with mod wrap can actually
block these IP using denyhosts.
I had googled but I did not see any proftpd rpm with mod wrap. Is there
anyone with a copy would like to share?
Or can someone share a spec file, so I
2009 Nov 04
0
The error occurred while evaluating nil.prefetch_primary_key
The error occurred while evaluating nil.prefetch_primary_key?
Hi,
I have a problem with a model when I have 3 belongs_to relations in one
the middle.
This example is a subset of a grid-routing project:
n 1
1 n +------------ Project
Connection ------- ConnectionCost
+------------ WaySearchRun
2006 Mar 20
6
[OT maybe] netcafe firewall
Hi all,
I appologise in advance if this is a little OT, but I am building
a box that will serve as firewall and router for a small ''internet
cafe / netcafe'' and am using CentOS...
So here it is:
What are the best tools to be used for keeping the potential
script kiddies from ''harming the Internet'' :) ? I specifically want
to be able to detect and prevent