2009/8/2 mrfroasty <mrfroa...@gmail.com>:
> Hello,
>
> I have setup iptables and fail2ban, but I am curios that this line of
> defense seem not to work and ban me if i do this:
> #wget ftp://mysql:x...@fileserver
>
> I have seen a script kido, doing that and firewall just didnt respond to
> him or atleast not on the logs that he had been banned when he tried that.
> The firewall does ban or respond if I do this:
> #wget ftp://foo:p...@fileserver
>
> Probably he could have been banned if used a different user, but not
> mysql...I am confused...any clue? :-D

You haven't provide any pertinent background information (ftp daemon
in use, log message which is expected to trigger action, details of
the fail2ban filter and so forth), which makes it rather difficult to
take a view. My guess is that the particular filter you are using
contains a regex which matches log messages from the daemon which
convey only an invalid user, rather than an authentication failure in
general. If so, you would need to adjust the filter - or add an
additional one - so as to cover both cases.

As a side note, do be careful when crafting the regular expressions
that form the basis of the filter. The slightest mistake can
potentially result in the tool being open to attack itself via log
injection. For more information on this topic, search for
"attacking-loganalysis.html" via Google and view the cached copy; the
original article seems to have disappeared from the ossec.net site.

Cheers,

--Kerin

Reply via email to