comparison README @ 65:d2e2b82dd2f2

Work on DroneBL support.
author Matti Hamalainen <ccr@tnsp.org>
date Tue, 18 Aug 2009 00:43:10 +0300
parents 8b33436dd18b
children 42889eed0ce8
comparison
equal deleted inserted replaced
64:213e5204abea 65:d2e2b82dd2f2
1 Malicious Attack Livid Termination Filter daemon (maltfilter) v0.14.0 1 Malicious Attack Livid Termination Filter daemon (maltfilter) v0.15.0
2 ===================================================================== 2 =====================================================================
3 Programmed by Matti 'ccr' Hämäläinen <ccr@tnsp.org> 3 Programmed by Matti 'ccr' Hämäläinen <ccr@tnsp.org>
4 (C) Copyright 2009 Tecnic Software productions (TNSP) 4 (C) Copyright 2009 Tecnic Software productions (TNSP)
5 5
6 Distributed under the modified ("3-clause") BSD license. Please see 6 Distributed under the modified ("3-clause") BSD license. Please see
12 including auth.log, httpd logs, etc. for signs of malicious connections, 12 including auth.log, httpd logs, etc. for signs of malicious connections,
13 break-in and exploitation attempts. The originating IP addresses of 13 break-in and exploitation attempts. The originating IP addresses of
14 these connections are then blocked via Netfilter (iptables). 14 these connections are then blocked via Netfilter (iptables).
15 15
16 Additionally Maltfilter can generate status reports (either continuously 16 Additionally Maltfilter can generate status reports (either continuously
17 in daemon mode, or as once-run report), in plaintext and HTML formats. 17 in daemon mode, or as once-run report), in plaintext and HTML formats
18 and submit data to DroneBL DNSBL service.
18 19
19 Since v0.14, there is also option for gathering "evidence" about certain 20 Since v0.14, there is also option for gathering "evidence" about certain
20 PHP XSS exploit attempts into specified directory. These evidence files 21 PHP XSS exploit attempts into specified directory. These evidence files
21 include the attempted exploit code (if found) and hosts which have tried 22 include the attempted exploit code (if found) and hosts which have tried
22 to make your server run it. 23 to make your server run it.