Subject: Re: Autoblocking sites after ssh probes
To: Martin Husemann <current-users@NetBSD.org, martin@duskware.de>
From: Hubert Feyrer <hubertf@gmx.de>
List: current-users
Date: 02/03/2005 01:46:27
In article <20050127222942.GA12893@drowsy.duskware.de> you wrote:
> Now, here is the question: does anyone know of a tool to automagically recognize
> this sequence of logs that temporarily adds the coresponding block rules to
> ipf and expires them after, say, 24 hours?
I don't know any ready-made software, but I guess snort could be used to
detect the login attempts, and you could then load these lines dynamically
into "ipf -f -", and remove the same lines with loading them to "ipf -r -f
-" (both from stdin). See [1] for a bit of (german language) documentation
on dynamic IPF config.
Implementation of timeouts may be possible via at(1) or some other
facility.
- Hubert
[1] http://smaug.fh-regensburg.de/~feyrer/vulab/hubertf/firewall
--
___ _ _ _ _ * Harddisk Image Cloning *
/ __| | || | | | www.feyrer.de/g4u/
| (_ |_ _| |_| |
\___| |_| \___/ Version 2.0 out now!