Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 8 Sep 2004 18:55:55 -0700 (PDT)
From:      Doug White <dwhite@gumbysoft.com>
To:        Ryan Sommers <ryans@gamersimpact.com>
Cc:        current@freebsd.org
Subject:   Re: Periodic security
Message-ID:  <20040908185203.K81868@carver.gumbysoft.com>
In-Reply-To: <50241.208.4.77.15.1093981761.squirrel@www2.neuroflux.com>
References:  <50241.208.4.77.15.1093981761.squirrel@www2.neuroflux.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 31 Aug 2004, Ryan Sommers wrote:

> Slight modification to the loginfail script for periodics. This will catch
> sshd, proftpd and su errors, as well as other programs, better.

The drawback to this is that it will log multiple messages from ssh since
it prints a couple of 'illegal' lines before the "failed password for
illegal user ...' line.  It'd be nice to filter those down somewhat.

>
> --- 800.loginfail       Mon Aug 30 21:50:50 2004
> +++ 800.loginfail       Mon Aug 30 21:51:53 2004
> @@ -59,7 +59,7 @@
>      [Yy][Ee][Ss])
>         echo ""
>         echo "${host} login failures:"
> -       n=$(catmsgs | grep -ia "^$yesterday.*fail" |
> +       n=$(catmsgs | egrep -ia "^$yesterday.*(fail|invalid|bad|illegal)" |
>             tee /dev/stderr | wc -l)
>         [ $n -gt 0 ] && rc=1 || rc=0;;
>      *) rc=0;;
>
>

-- 
Doug White                    |  FreeBSD: The Power to Serve
dwhite@gumbysoft.com          |  www.FreeBSD.org



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040908185203.K81868>