Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

Can I supply additional regular expressions to DenyHosts?

0
10 Posted

Can I supply additional regular expressions to DenyHosts?

0
10

Yes. New in v1.1.5, DenyHosts adds the ability for the user to specify additional regular expressions that can be used to locate possible break-in attempts. The USERDEF_FAILED_ENTRY_REGEX can be specified repeatedly. Each value must contain a single regular expression that includes a host regular expression group and optionally a user group. It is assumed that the end user is familiar with regular expressions in order to take advantage of this feature. Examples: USERDEF_FAILED_ENTRY_REGEX=break in attempt for (?P.*) from (?P.*) USERDEF_FAILED_ENTRY_REGEX=break in attempt from (?P.*) If multiple USERDEF_FAILED_ENTRY_REGEX are supplied they are evaluated in the order that they appear in the configuration file. Additionally, this parameter is evaluated after the built-in regular expressions (ie. FAILED_ENTRY_REGEX, FAILED_ENTRY_REGEX2, …).

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123