User Tools

Site Tools


lock_attempts_ssh

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
Next revisionBoth sides next revision
lock_attempts_ssh [2014/09/01 03:20] – created k0kadlock_attempts_ssh [2014/09/01 03:24] k0kad
Line 4: Line 4:
 ~K0KAD ~K0KAD
  
-Step One—Install Fail2Ban+**Step One—Install Fail2Ban** 
 Because fail2ban is not available from CentOS, we should start by downloading the EPEL repository: Because fail2ban is not available from CentOS, we should start by downloading the EPEL repository:
  
-rpm -Uvh http://dl.fedoraproject.org/pub/epel/6/x86_64/epel-release-6-8.noarch.rpm+''rpm -Uvh http://dl.fedoraproject.org/pub/epel/6/x86_64/epel-release-6-8.noarch.rpm'' 
 Follow up by installing fail2ban: Follow up by installing fail2ban:
  
-yum install fail2ban +''yum install fail2ban'' 
-Step Two—Copy the Configuration File+ 
 +**Step Two—Copy the Configuration File** 
 The default fail2ban configuration file is location at /etc/fail2ban/jail.conf. The configuration work should not be done in that file, however, and we should instead make a local copy of it. The default fail2ban configuration file is location at /etc/fail2ban/jail.conf. The configuration work should not be done in that file, however, and we should instead make a local copy of it.
  
Line 17: Line 21:
 After the file is copied, you can make all of your changes within the new jail.local file. Many of possible services that may need protection are in the file already. Each is located in its own section, configured and turned off. After the file is copied, you can make all of your changes within the new jail.local file. Many of possible services that may need protection are in the file already. Each is located in its own section, configured and turned off.
  
-Step Three—Configure defaults in Jail.Local+**Step Three—Configure defaults in Jail.Local**
 Open up the the new fail2ban configuration file: Open up the the new fail2ban configuration file:
  
-vi /etc/fail2ban/jail.local+''pico /etc/fail2ban/jail.local'' 
 The first section of defaults covers the basic rules that fail2ban will follow. If you want to set up more nuanced protection for your virtual private server, you can customize the details in each section. The first section of defaults covers the basic rules that fail2ban will follow. If you want to set up more nuanced protection for your virtual private server, you can customize the details in each section.
  
lock_attempts_ssh.txt · Last modified: 2014/09/01 03:32 by k0kad