DenyHosts is an open source and free log-based intrusion prevention security program for SSH servers developed in Python language by Phil Schwartz. It is intended to monitor and analyzes SSH server logs for invalid login attempts, dictionary based attacks and brute force attacks by blocking the originating IP addresses by adding an entry to /etc/hosts.deny file on the server and prevents the IP address from making any further such login attempts.
See also :
- Fail2ban (Intrusion Prevention) System for SSH
- Disable or Enable SSH Root Login
- Linux Malware Detect (LMD)
Installing DenyHosts in RHEL, CentOS and Fedora
By default DenyHosts tool is not included in the Linux systems, we need to install it using third party EPEL repository. Once added repository, install the package using following YUM command.
Configuring DenyHosts for Whitelist IP Addresses
Once the Denyhosts installed, make sure to whitelist your own IP address, so you will never get locked out. To do this, open a file /etc/hosts.allow.
Below the description, add the each IP address one-by-one on a separate line, that you never want to block. The format should be as follows.
Configuring DenyHosts for Email Alerts
The main configuration file is located under /etc/denyhosts.conf. This file is used to send email alerts about suspicious logins and restricted hosts. Open this file using VI editor.
Search for the ‘ADMIN_EMAIL‘ and add your email address here to receive email alerts about suspicious logins (for multiple email alerts use comma separated). Please have a look at the configuration file of my CentOS 6.3 server. Each variable is well documented so configure it according to your liking.
Restarting DenyHosts Service
Once you’ve done with your configuration, restart the denyhosts service for new changes. We also add the denyhosts service to system start-up.
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
► Read more: http://adf.ly/1n6ZTp
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
No comments:
Post a Comment