Hi Cyril,

Following this bug report:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=366112
I've decided to add this feature request to your list ;-)

Now maxfailures doesn't distinguish between different attack attempts,
so there is no difference if there is 5 unsuccessful attempts for the
same account (can be simply due to bad gray brain cells of the users),
or there is a sweep of 5 different tested login names.

Even more relevant: if there is an attack on apache trying to
exploid known vulnerability, they blindly go through various URLs which
could be present on the server. So pretty much as with different login
names during SSH attack. A single url from within this set can be valid
on its own, thus we should not ban the IP if it has multiple accesses to
the same "valid" URL.

Do you think it would make sense to add "maxdifffailures" which would
spot for the scanning attempts. It would be useful for ssh as well, so
we could raise maxfailures up to 10 to allow users with bad memory
finally get to their password, but have maxdifffailures around 4, so if
there is a sweep of attempts (different login names, different known
"weak" urls, etc), then it gets baned sooner. Can be quite easily
implemented by adding a named group in current regexps (named as
"target"), and keeping a list of hit targets for every detected attacker
IP. As soon as list gets longer than maxdifffailures - ban it.

Please let me know what you think!
I think I can implement it in the current version (as soon as I get to
fail2ban :-) -- I have a backlog of things to do on it already, I know
;-))


On Fri, 05 May 2006, Yaroslav Halchenko wrote:

> I doubt that this wishlist should be addressed due

> 1. fail2ban works at the moment independently on each log line, thus it
> is impossible to discriminate between multiple occasions of a single
> line (which could be totally "legal") or different multiple matches.

> 2. xmlrpc vulnerability was fixed and there are multiple softwares
> using it, and we don't want to block hosts which would access xmlrpc.php
> for a good reason ;-)

> thus at the moment I don't see this rule implemented.

> but I would suggest to rephrase this wishlist may be as a new feature
> request to have multiple separate regexps, and ban
> if a given IP scans through the list, trying to sense present vulnerable
> software. If you agree that it might be useful -- I would forward this
> wishlist upstream. If you think that the issue is minor - I would like
> to close the bug with "wontfix"
-- 
                                  .-.
=------------------------------   /v\  ----------------------------=
Keep in touch                    // \\     (yoh@|www.)onerussian.com
Yaroslav Halchenko              /(   )\               ICQ#: 60653192
                   Linux User    ^^-^^    [175555]


Attachment: pgpgLgL2iU75S.pgp
Description: PGP signature

Reply via email to