Sysop: | Amessyroom |
---|---|
Location: | Fayetteville, NC |
Users: | 23 |
Nodes: | 6 (0 / 6) |
Uptime: | 54:38:49 |
Calls: | 583 |
Files: | 1,139 |
D/L today: |
179 files (27,921K bytes) |
Messages: | 111,801 |
Hello!
What is a good way to identify the source of the Attempt to create:
lines in debug log?
I would like to identify the apache log strings to check if a f2b rule
is possible.
rocksolid Attempt to create:
/var/spool/rslight//de.admin.net-abuse.news
Fehlverhalten-data.db3 for: de.admin.net-abuse.news Fehlverhalt
This looks either like intended to destroy something or a bug.
You would need to ALSO check for obvious SQL statements in the line
in debug.log before adding a blocking rule to fail2ban.
On 15.08.2024 um 08:50 Uhr Retro Guy wrote:
You would need to ALSO check for obvious SQL statements in the line
in debug.log before adding a blocking rule to fail2ban.
How can I identify the IP of that?
This would help me to find the lines in access apache log.
I would like to find out which action causes that, so I can find the
abusers and block them.
On Thu, 15 Aug 2024 18:15:49 +0000, Marco Moock wrote:
On 15.08.2024 um 08:50 Uhr Retro Guy wrote:
You would need to ALSO check for obvious SQL statements in the line
in debug.log before adding a blocking rule to fail2ban.
How can I identify the IP of that?
This would help me to find the lines in access apache log.
I would like to find out which action causes that, so I can find the abusers and block them.
You should be able to see them entirely in the apache log. A filter
would need to look for SQL commands. My comment above is incorrect,
you do not need to ALSO check the rslight log. Don't know what I was thinking.
So, a f2b filter regex that looks for common SQL commands should do
it. You don't need to bother with the rslight log for that.
On 15.08.2024 um 18:47 Uhr Retro Guy wrote:
On Thu, 15 Aug 2024 18:15:49 +0000, Marco Moock wrote:
On 15.08.2024 um 08:50 Uhr Retro Guy wrote:
You would need to ALSO check for obvious SQL statements in the line
in debug.log before adding a blocking rule to fail2ban.
How can I identify the IP of that?
This would help me to find the lines in access apache log.
I would like to find out which action causes that, so I can find the
abusers and block them.
You should be able to see them entirely in the apache log. A filter
would need to look for SQL commands. My comment above is incorrect,
you do not need to ALSO check the rslight log. Don't know what I was
thinking.
So, a f2b filter regex that looks for common SQL commands should do
it. You don't need to bother with the rslight log for that.
I tried to find it, I can't find it.
I've grepped for various terms, I can't find something problematic.