Date: Wed, 8 Sep 2004 18:55:55 -0700 (PDT) From: Doug White <dwhite@gumbysoft.com> To: Ryan Sommers <ryans@gamersimpact.com> Cc: current@freebsd.org Subject: Re: Periodic security Message-ID: <20040908185203.K81868@carver.gumbysoft.com> In-Reply-To: <50241.208.4.77.15.1093981761.squirrel@www2.neuroflux.com> References: <50241.208.4.77.15.1093981761.squirrel@www2.neuroflux.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 31 Aug 2004, Ryan Sommers wrote: > Slight modification to the loginfail script for periodics. This will catch > sshd, proftpd and su errors, as well as other programs, better. The drawback to this is that it will log multiple messages from ssh since it prints a couple of 'illegal' lines before the "failed password for illegal user ...' line. It'd be nice to filter those down somewhat. > > --- 800.loginfail Mon Aug 30 21:50:50 2004 > +++ 800.loginfail Mon Aug 30 21:51:53 2004 > @@ -59,7 +59,7 @@ > [Yy][Ee][Ss]) > echo "" > echo "${host} login failures:" > - n=$(catmsgs | grep -ia "^$yesterday.*fail" | > + n=$(catmsgs | egrep -ia "^$yesterday.*(fail|invalid|bad|illegal)" | > tee /dev/stderr | wc -l) > [ $n -gt 0 ] && rc=1 || rc=0;; > *) rc=0;; > > -- Doug White | FreeBSD: The Power to Serve dwhite@gumbysoft.com | www.FreeBSD.org
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040908185203.K81868>