Page:
Ban Brute Force Crackers
Pages
Ban Brute Force Crackers
Block Connection to localhost
Change Server on the Fly
Configuration via Config File
Configure Multiple Users
Configure Shadowsocks with Supervisor
Connect to OpenVPN over Shadowsocks
Convert Shadowsocks into an HTTP proxy
Encryption
Feature Comparison across Different Versions
Forcing Chrome to Use Socks5 Proxy
Generate QR Code for Android or iOS Clients
Gentoo overlay
Graceful shutdown and restart
Home
Install Shadowsocks Server on Windows
Manage Multiple Users
Objective
Optimizing Shadowsocks
Ports and Clients
Salsa20
Securing Public Shadowsocks Server
Setting Up Shadowsocks on Linode
Setup a Shadowsocks relay
Shadowsocks 使用说明
TCP Fast Open
Troubleshooting
Using Shadowsocks with Command Line Tools
Workers
优化 Shadowsocks
回复模版
在 Linode 上快速搭建 Shadowsocks
用 Supervisor 运行 Shadowsocks
No results
3
Ban Brute Force Crackers
clowwindy edited this page 2015-01-02 23:28:32 -08:00
Shadowsocks 2.6.2+ output the IPs that try to brute force crack your password.
You can use utils/autoban.py to ban them.
python autoban.py < /var/log/shadowsocks.log
Use -c
to specify with how many failure times it should be considered as an
attack. Default is 3.
To continue watching for the log file:
nohup tail -F /var/log/shadowsocks.log | python autoban.py >log 2>log &
Use with caution. Avoid to ban yourself.