BFD -- Brute Force Detection

BFD is a shell script which parses security logs and detects authentication failures. It is a brute force implementation without much complexity, and it works in conjunction with a APF (Advanced Policy-based Firewall).

## Get the latest source and untar.
# cd /usr/src/utils
# wget
# tar xfz bfd-current.tar.gz
# cd bfd-*
# ./

Read the README file, and edit the configuration file located in /usr/local/bfd/conf.bfd.
Find ALERT="0" and replace it with ALERT="1"
Find EMAIL_USR="root" and replace it with EMAIL_USR=""

Edit /usr/local/bfd/ignore.hosts file, and add your own trusted IPs. BFD uses APF and hence it orverrides allow_hosts.rules, so it is important that you add trusted IP addresses to prevent yourself from being locked out.

## Start the program.
#  /usr/local/sbin/bfd -s

Was this answer helpful?
Also Read
Ranges to allow through server firewall (Views: 473)
Howto Install B.F.D Brute Force Detection (Views: 554)
Hardware Firewall configuration (Views: 517)
Configure APF Firewall (Views: 506)
Can I load balance servers that are behind a firewall? (Views: 597)

Powered by WHMCompleteSolution