Adam Rykala wrote:
>
> For portsentry
> pico /etc/rc.local and add the following lines to the end
>
> /usr/sbin/portsentry -atcp
> /usr/sbin/portsentry -audp
>
> now go to the directory /etc/portsentry and edit the two
> files there with pico. They're fully self explanatory.
>
> Reboot
> Thats it
- Are the above instructions for a 'standard' install, or is this a special case? I have a server getting hit with lots of Nimda attacks, and I'd like to 'drop' those attacks if possible (but still log them!). Check out this link to see all the Nimda attacks:
http://64.3.180.188/apache-hits.php> Any entries will get dropped into /etc/hosts.deny (using
> TCPWrappers to deny entry) and a route command will hedge
> them off to 127.0.0.1
>
> Any alerts will end up in /var/log/messages. As my e-smith
> box is a home server I leave the second screen logged in with
>
> tail -f /var/log/messages
>
> running
- Could you be more specific about what the above command does? Is this just streaming the alerts on your server console?
> For Logcheck
> No need to do nothing - adds itself to your crontab and
> emails you suspicious entries from /var/log/messages on an
> hourly basis
- I am running Logcheck, and it works great.
Have you heard of LaBrea (
http://www.hackbusters.net/LaBrea/) "tarpit"? Any thoughts?
Thanks.
Regards,
Patrick