swetoast
Guest
PREAMBLE: make sure you set your ban lists if you didn't then don't blame me if you get banned. Start it either via services_start or init.d file thats provided on my gitlab.
INTRODUCTION: So what it does it scans the syslog for Bad password attempts then if its found it check the whitelist for ip that are allowed to bash the ssh with bad passwords (thinking of setting a value on this in the future).
The whitelist is dead simple add your ip in a row
and the whitelist will remove these entries, if the ip is not found in the whitelist then it move to ban it from the service not from the network but the service only. And with that said, play and have fun and if you think of an improvement then please tell me here
https://gitlab.com/swe_toast/dropbear-offenders/tree/master
INTRODUCTION: So what it does it scans the syslog for Bad password attempts then if its found it check the whitelist for ip that are allowed to bash the ssh with bad passwords (thinking of setting a value on this in the future).
The whitelist is dead simple add your ip in a row
Code:
192.168.1.2
192.168.1.3
and the whitelist will remove these entries, if the ip is not found in the whitelist then it move to ban it from the service not from the network but the service only. And with that said, play and have fun and if you think of an improvement then please tell me here
https://gitlab.com/swe_toast/dropbear-offenders/tree/master