Hello!
What is a good way to identify the source of the Attempt to create:
lines in debug log?
I would like to identify the apache log strings to check if a f2b rule
is possible.
rocksolid Attempt to create:
/var/spool/rslight//de.admin.net-abuse.news
Fehlverhalten-data.db3 for: de.admin.net-abuse.news Fehlverhalt
This looks either like intended to destroy something or a bug.
You would need to ALSO check for obvious SQL statements in the line
in debug.log before adding a blocking rule to fail2ban.
On 15.08.2024 um 08:50 Uhr Retro Guy wrote:
You would need to ALSO check for obvious SQL statements in the line
in debug.log before adding a blocking rule to fail2ban.
How can I identify the IP of that?
This would help me to find the lines in access apache log.
I would like to find out which action causes that, so I can find the
abusers and block them.
On Thu, 15 Aug 2024 18:15:49 +0000, Marco Moock wrote:
On 15.08.2024 um 08:50 Uhr Retro Guy wrote:
You would need to ALSO check for obvious SQL statements in the line
in debug.log before adding a blocking rule to fail2ban.
How can I identify the IP of that?
This would help me to find the lines in access apache log.
I would like to find out which action causes that, so I can find the abusers and block them.
You should be able to see them entirely in the apache log. A filter
would need to look for SQL commands. My comment above is incorrect,
you do not need to ALSO check the rslight log. Don't know what I was thinking.
So, a f2b filter regex that looks for common SQL commands should do
it. You don't need to bother with the rslight log for that.
On 15.08.2024 um 18:47 Uhr Retro Guy wrote:
On Thu, 15 Aug 2024 18:15:49 +0000, Marco Moock wrote:
On 15.08.2024 um 08:50 Uhr Retro Guy wrote:
You would need to ALSO check for obvious SQL statements in the line
in debug.log before adding a blocking rule to fail2ban.
How can I identify the IP of that?
This would help me to find the lines in access apache log.
I would like to find out which action causes that, so I can find the
abusers and block them.
You should be able to see them entirely in the apache log. A filter
would need to look for SQL commands. My comment above is incorrect,
you do not need to ALSO check the rslight log. Don't know what I was
thinking.
So, a f2b filter regex that looks for common SQL commands should do
it. You don't need to bother with the rslight log for that.
I tried to find it, I can't find it.
I've grepped for various terms, I can't find something problematic.
| Sysop: | Amessyroom |
|---|---|
| Location: | Fayetteville, NC |
| Users: | 59 |
| Nodes: | 6 (0 / 6) |
| Uptime: | 19:48:30 |
| Calls: | 812 |
| Calls today: | 2 |
| Files: | 1,287 |
| D/L today: |
20 files (23,248K bytes) |
| Messages: | 210,075 |