fail2ban would be a good solution for you, as it is easily configurable -- but as you say, if you can do something similar with your own scripts, no issue. fail2ban is setup on the login/asterisk/apache side of things for me -- robert set it up for me :-)
Dan.
On Tue, Sep 21, 2010 at 4:38 PM, Gilles Detillieux < grdetil@scrc.umanitoba.ca> wrote:
I'm really looking for an automated solution. I suppose I could set something up using fail2ban to do this, but as I've never installed and configured that either, I don't know if this would be any easier than any of the add-on modules for Apache. For now, the quick addition to my CGI wrapper script will probably do the trick.
On 18/09/2010 8:09 PM, Brock Wolfe wrote:
I prefer the DROP packet by IP ADDRESS solution. Simple and to the point. Worked really well for me on abusive crawlers from china and russia. 8-)
Brock
-- Gilles R. Detillieux E-mail: grdetil@scrc.umanitoba.ca Spinal Cord Research Centre WWW: http://www.scrc.umanitoba.ca/ Dept. Physiology, U. of Manitoba Winnipeg, MB R3E 0J9 (Canada) _______________________________________________ Roundtable mailing list Roundtable@muug.mb.ca http://www.muug.mb.ca/mailman/listinfo/roundtable