Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Fail2ban has issues when you have a lot of IPs blocked in memory.

The solution I came up with to this problem is to use a custom ban action that adds an IP to the blocked ipset list with a given TTL, but set fail2ban to think that the IP has to be only banned for 5 seconds or so.

The result is that ipset purges the IP from the list after the TTL expires, but fail2bans working set is a 5 second rolling windows of blocked IPs.

This works great and it's being used in production for a couple of years.



Sounds like a great solution. Have you written about this in any detail?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: