====== DenyHosts == ===== General == Denyhosts blocks IP addresses from which SSH breakin attempts are detected. [[http://www.geekride.com/index.php/secure-your-ssh-server-with-denyhosts/|found here]] - [[ http://denyhosts.sourceforge.net/features.html|Homepage]] Blocked IP addresses are added to ''/etc/hosts.deny''. ===== Slackware == DenyHosts is available at www.slackbuilds.org After intall copy config files to /etc: cp /usr/share/denyhosts/denyhosts.cfg-dist /etc/denyhosts.cfg ln /usr/share/denyhosts/denyhosts.cfg-dist /etc/denyhosts.cfg.sborg cp /usr/share/denyhosts/daemon-control-dist /etc/rc.d/rc.denyhosts ln /usr/share/denyhosts/daemon-control-dist /etc/rc.d/rc.denyhosts.sborg Edit ''/etc/rc.d/rc.denyhosts'': --- rc.denyhosts.sborg 2006-04-22 01:04:43.000000000 +0200 +++ rc.denyhosts 2013-11-22 09:59:08.803109065 +0100 @@ -12,8 +12,8 @@ ############################################### DENYHOSTS_BIN = "/usr/bin/denyhosts.py" -DENYHOSTS_LOCK = "/var/lock/subsys/denyhosts" -DENYHOSTS_CFG = "/usr/share/denyhosts/denyhosts.cfg" +DENYHOSTS_LOCK = "/var/run/denyhosts.pid" +DENYHOSTS_CFG = "/etc/denyhosts.cfg" PYTHON_BIN = "/usr/bin/env python" Edit ''/etc/denyhosts.cfg'': --- denyhosts.cfg.sborg 2006-08-20 16:09:57.000000000 +0200 +++ denyhosts.cfg 2013-11-22 10:21:38.564117102 +0100 @@ -9,13 +9,13 @@ # argument # # Redhat or Fedora Core: -SECURE_LOG = /var/log/secure +#SECURE_LOG = /var/log/secure # # Mandrake, FreeBSD or OpenBSD: #SECURE_LOG = /var/log/auth.log # # SuSE: -#SECURE_LOG = /var/log/messages +SECURE_LOG = /var/log/messages # # Mac OS X (v10.4 or greater - # also refer to: http://www.denyhosts.net/faq.html#macos @@ -55,10 +55,10 @@ # 'y' = years # # never purge: -PURGE_DENY = +#PURGE_DENY = # # purge entries older than 1 week -#PURGE_DENY = 1w +PURGE_DENY = 1w # # purge entries older than 5 days #PURGE_DENY = 5d @@ -192,10 +192,10 @@ # running at a time. # # Redhat/Fedora: -LOCK_FILE = /var/lock/subsys/denyhosts +#LOCK_FILE = /var/lock/subsys/denyhosts # # Debian -#LOCK_FILE = /var/run/denyhosts.pid +LOCK_FILE = /var/run/denyhosts.pid # # Misc #LOCK_FILE = /tmp/denyhosts.lock Finally add /etc/rc.d/rc.denyhosts start to ''/etc/rc.d/rc.local'' More info at /usr/share/denyhosts/README.txt FIXME Check if blocked hosts really get purged after 1 week! ===== Debian == Install denyhosts with ''aptitude install denyhosts''. This also adds the necessary autstart scripts and symlinks in ''/etc/init.d'', ''/etc/rcX.d'' and '''/etc/logrotate.d''. It further sets some default entries in ''/etc/hosts.deny'' and starts denyhosts. Config file is ''/etc/denyhosts.conf'' By doing so, attackers will be blocked from all ports, e.g. HTTP as well. The IP addresses will be unblocked after half a year. Then restart with ''/etc/init.d/denyhosts restart''. ===== Howto remove blocked adresses == The software stores its data internally, probably at ''/usr/share/denyhosts/data''. Manual changes in ''/etc/hosts.deny'' get overwritten! Did not find anythind regarding this topic on the homepage of denyhosts. So here is workaround to delete //all// blocked hosts: Stop daemon: ''/etc/rc.d/rc.denyhosts stop'' Set ''PURGE_DENY = 1m'' in ''/etc/denyhosts.cfg'' Run ''denyhosts.py --purge'' Restore ''PURGE_DENY = 1w'' in ''/etc/denyhosts.cfg'' Restart daemon: ''/etc/rc.d/rc.denyhosts start''