Misplaced Pages

DenyHosts

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

This is an old revision of this page, as edited by Miami33139 (talk | contribs) at 22:15, 19 December 2009 (Nominated for deletion; see Misplaced Pages:Articles for deletion/DenyHosts. (TW)). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Revision as of 22:15, 19 December 2009 by Miami33139 (talk | contribs) (Nominated for deletion; see Misplaced Pages:Articles for deletion/DenyHosts. (TW))(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)
An editor has nominated this article for deletion.
You are welcome to participate in the deletion discussion, which will decide whether or not to retain it.Feel free to improve the article, but do not remove this notice before the discussion is closed. For more information, see the guide to deletion.
Find sources: "DenyHosts" – news · newspapers · books · scholar · JSTOR%5B%5BWikipedia%3AArticles+for+deletion%2FDenyHosts%5D%5DAFD
DenyHosts
Developer(s)Phil Schwartz
Stable release2.6 / December 7, 2007; 17 years ago (2007-12-07)
Repository
Written inPython
Operating systemLinux,FreeBSD
TypeSecurity tool
LicenseGPL
Websitedenyhosts.sf.net

DenyHosts is a Python based security tool for SSH servers. It is intended to prevent brute force attacks on SSH servers by monitoring invalid login attempts in the authentication log and blocking the originating IP addresses. Denyhosts is developed by Phil Schwartz, who is also the developer of Kodos Python regular expression debugger.

Operation

DenyHosts checks the end of the authentication log for recent failed login attempts. It records information about their originating IP addresses and compares the number of invalid attempts to a user-specified threshold. If there have been too many invalid attempts it assumes a dictionary attack is occurring and prevents the IP address from making any further attempts by adding it to /etc/hosts.deny on the server. DenyHosts 2.0 and above support centralized synchronization, so that repeat offenders are blocked from many computers.

DenyHosts may be run manually, as a daemon, or as a cron job.

See also

References

  • Carla Schroder, Linux Networking Cookbook, O'Reilly, 2007, pp. 223–226, ISBN 0596102488

External links

Categories: