Linux - SoftwareThis forum is for Software issues.
Having a problem installing a new program? Want to know which application is best for the job? Post your question in this forum.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Is there a way to prevent or perhaps racks multiple failed logins though ncsa_auth on squid?
I am getting a whole host of 407 errors in the access.logs
If a client access the proxy without providing authentication information the proxy will return the 407 error code. That is a Good Thing.
Yes! But I want to know if they are trying repeatedly to brute force their way by the ncsa_auth.
There doesn't seem to be a way in squid to log IP auth requests through ncsa_auth - or is there?
Yes! But I want to know if they are trying repeatedly to brute force their way by the ncsa_auth.
There doesn't seem to be a way in squid to log IP auth requests through ncsa_auth - or is there?
Doesn't Sarg provides authentication failures reporting? Doesn't your log include lines showing "DENIED/407"? Any log watcher that is capable of filtering regexes from the log and responding with custom actions should be able to work on lines like this:
Code:
1140701230.827 781 192.168.11.01 TCP_DENIED/407 1785 GET http://www.linuxquestions.org/ user NONE/- text/html
Doesn't Sarg provides authentication failures reporting? Doesn't your log include lines showing "DENIED/407"? Any log watcher that is capable of filtering regexes from the log and responding with custom actions should be able to work on lines like this:
Code:
1140701230.827 781 192.168.11.01 TCP_DENIED/407 1785 GET http://www.linuxquestions.org/ user NONE/- text/html
Yes, sarg gave me those lines.
But there's nothing automatic that can ban them as soon as they try logging in say x times in x minutes?
I thought fail2ban only did ssh and a few other things.
Yes, sarg gave me those lines.
But there's nothing automatic that can ban them as soon as they try logging in say x times in x minutes?
I thought fail2ban only did ssh and a few other things.
IMO regexes are general stuff, I doubt the Squid user group is the right place for it, rather the fail2ban mailing list. The problem is that Squid logs in epoch-stylee and not syslog-like or human readable. I'm not sure about the timeregex / timepattern (%s?) vars but since 'awk '/TCP_DENIED\/407/ {print $3}' /path/to/logfile' prints the IP you need, maybe the failregex could look like ": .*TCP_DENIED\/407.*"?..
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.