<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Libre Things &#187; security</title>
	<atom:link href="http://positon.org/tag/security/feed" rel="self" type="application/rss+xml" />
	<link>http://positon.org</link>
	<description></description>
	<lastBuildDate>Tue, 23 Feb 2016 20:01:11 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.7.1</generator>
	<item>
		<title>Fail2ban</title>
		<link>http://positon.org/fail2ban</link>
		<comments>http://positon.org/fail2ban#comments</comments>
		<pubDate>Mon, 03 Aug 2009 13:20:00 +0000</pubDate>
		<dc:creator><![CDATA[dooblem]]></dc:creator>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[iptables]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[SSH]]></category>

		<guid isPermaLink="false">http://positon.org:81/?p=58</guid>
		<description><![CDATA[If you discover lots of ssh connection tries in your /var/log/auth.log (bots testing users/passwords), you have to do something. The simpler is to use an IP restriction rule in your iptables firewall, or in /etc/hosts.deny If you don&#8217;t want or can&#8217;t use this restriction, use Fail2ban: aptitude install fail2ban The default install blocks SSH connection [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>If you discover lots of ssh connection tries in your <code>/var/log/auth.log</code> (bots testing users/passwords), you have to do something.</p>
<p>The simpler is to use an IP restriction rule in your iptables firewall, or in <code>/etc/hosts.deny</code></p>
<p>If you don&#8217;t want or can&#8217;t use this restriction, use <strong>Fail2ban</strong>:</p>
<pre>
aptitude install fail2ban
</pre>
<p>The default install blocks SSH connection tries.</p>
<p>You can tune the config a bit or activate Fail2ban for other services. Example:</p>
<pre>
vi /etc/fail2ban/jail.conf
bantime  = 86400
maxretry = 10 # pour ssh
enabled  = true # pour vsftpd
maxretry = 10 # pour vsftpd
</pre>
<p>Then, the <code>iptables -L</code> command gives you all banned IP addresses.</p>
]]></content:encoded>
			<wfw:commentRss>http://positon.org/fail2ban/feed</wfw:commentRss>
		<slash:comments></slash:comments>
		</item>
	</channel>
</rss>
