Mercurial > hg > maltfilter
comparison README @ 65:d2e2b82dd2f2
Work on DroneBL support.
author | Matti Hamalainen <ccr@tnsp.org> |
---|---|
date | Tue, 18 Aug 2009 00:43:10 +0300 |
parents | 8b33436dd18b |
children | 42889eed0ce8 |
comparison
equal
deleted
inserted
replaced
64:213e5204abea | 65:d2e2b82dd2f2 |
---|---|
1 Malicious Attack Livid Termination Filter daemon (maltfilter) v0.14.0 | 1 Malicious Attack Livid Termination Filter daemon (maltfilter) v0.15.0 |
2 ===================================================================== | 2 ===================================================================== |
3 Programmed by Matti 'ccr' Hämäläinen <ccr@tnsp.org> | 3 Programmed by Matti 'ccr' Hämäläinen <ccr@tnsp.org> |
4 (C) Copyright 2009 Tecnic Software productions (TNSP) | 4 (C) Copyright 2009 Tecnic Software productions (TNSP) |
5 | 5 |
6 Distributed under the modified ("3-clause") BSD license. Please see | 6 Distributed under the modified ("3-clause") BSD license. Please see |
12 including auth.log, httpd logs, etc. for signs of malicious connections, | 12 including auth.log, httpd logs, etc. for signs of malicious connections, |
13 break-in and exploitation attempts. The originating IP addresses of | 13 break-in and exploitation attempts. The originating IP addresses of |
14 these connections are then blocked via Netfilter (iptables). | 14 these connections are then blocked via Netfilter (iptables). |
15 | 15 |
16 Additionally Maltfilter can generate status reports (either continuously | 16 Additionally Maltfilter can generate status reports (either continuously |
17 in daemon mode, or as once-run report), in plaintext and HTML formats. | 17 in daemon mode, or as once-run report), in plaintext and HTML formats |
18 and submit data to DroneBL DNSBL service. | |
18 | 19 |
19 Since v0.14, there is also option for gathering "evidence" about certain | 20 Since v0.14, there is also option for gathering "evidence" about certain |
20 PHP XSS exploit attempts into specified directory. These evidence files | 21 PHP XSS exploit attempts into specified directory. These evidence files |
21 include the attempted exploit code (if found) and hosts which have tried | 22 include the attempted exploit code (if found) and hosts which have tried |
22 to make your server run it. | 23 to make your server run it. |