On Apr 5, 2011, at 11:46 PM, Ljubomir Ljubojevic wrote:
rrichard@blythe.org wrote:
Indeed! I run Fail2Ban not only against SSH, but against SMTP/AUTH and IMAPS/POP3S (the only client mail protocols we support). It's amazing how many dictionary attacks take place against SMTP by persistent spamers! Besides the effect against dictionary attacks, it makes the morning reading of the secure log a pleasant experience. :-)
My SMTP server has Reverse DNS check active, so any SMTP request from IP that does not have Reverse DNS record is automatically forbidden. Even SMTP servers tht are not properly configured (like one Bank server in my country that sends mails from some obscure IP without DNS record even thou I know they are legit) are denied.
fail2ban had some wrong with it, from the standpoint of my CentOS 5.x server (can't remember what I disliked), wheather it was rpm availability or something else, so I chose denyhosts. There was whole week recently without a single ssh attack on my 3 PC's (2 servers).
Ljubomir _______________________________________________ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
I have a centralized bridge PF (Packet Filter) setup and all my servers behind it. All the servers have fail2ban installed and the same on the firewall, so any malicious knock offs on the internal servers ignites the centralized PF that blocks the hosts right away. As mentioned above, I have been using fail2ban for SSH/SMTP/IMAP/POP3 and also have merged content filtering regexes from Amavis into it. That(regex) is the part I love about fail2ban, my fail2ban installation is on a CentOS 5.x box, rpm is available in rpmforge.
Gaurav