This looks like a Tomcat specific fail2ban clone to me. My
recommendation for users that want this sort of functionality is have
the app write the offending IP address (and optional additional info) to
a log file and configure fail2ban to monitor that log file.
Mark
On 05/08/2020 18:51, Dave Fi
Hi -
In my experience the scans you are reporting may be from a white hat security
scan of your website that is contracted by your security team. These tend to
try every exploit that is known for any web server to make sure that your web
apps is secure.
I’m not sure how the Tomcat team will re
>
> Alan,
>
>
> What kind of protections does this module provide? How does it
> integrate into Tomcat (e.g. custom
> Filter/Valve/ServletContextListener, patches to arbitrary places in
> Tomcat internals, etc.)?
>
The point of this code is to prevent malicious users from probing
Tomcat hosted app
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Alan,
On 8/3/20 21:25, Alan Basche wrote:
> I have recently developed code for Tomcat 8.5 that defends against
> black-hats probing Tomcat and the website apps for
> vulnerabilities. This coding effort started a year ago, and the
> latest code has b
Hello,
I have recently developed code for Tomcat 8.5 that defends against
black-hats probing Tomcat and the website apps for vulnerabilities.
This coding effort started a year ago, and the latest code has been
running successfully on Tomcat 8.5.49 (Linux server) for about 3
months. I feel that To