How we handle attacks?

Jhoanir Torres jhoanir at gmail.com
Thu Oct 3 12:55:39 UTC 2013


Is highly recommended use 'Fail2Ban' in victim servers.

--
Jhoanir Torres
El oct 3, 2013 7:20 AM, "Miroslav Suchý" <msuchy at redhat.com> escribió:

> I see in log file of copr-fe-dev a lot of attempts to login as
> root/postgres/nagios/oracl/**test user. Well it is ~4000 attempts. So it
> depend on your definition of "lot of". But it caught my attention.
>
> Do we have some standard procedure how to handle it? Add that IPs to
> blacklist? Move ssh port to non standard number? Or should I just ignore
> them?
> --
> Miroslav Suchy, RHCE, RHCDS
> Red Hat, Software Engineer, #brno, #devexp, #fedora-buildsys
> ______________________________**_________________
> infrastructure mailing list
> infrastructure at lists.**fedoraproject.org<infrastructure at lists.fedoraproject.org>
> https://admin.fedoraproject.**org/mailman/listinfo/**infrastructure<https://admin.fedoraproject.org/mailman/listinfo/infrastructure>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.fedoraproject.org/pipermail/infrastructure/attachments/20131003/9326a12c/attachment.html>


More information about the infrastructure mailing list