fail2ban would be a good solution for you, as it is easily configurable  -- but as you say, if you can do something similar with your own scripts, no issue.
fail2ban is setup on the login/asterisk/apache side of things for me -- robert set it up for me :-)

Dan.

On Tue, Sep 21, 2010 at 4:38 PM, Gilles Detillieux <grdetil@scrc.umanitoba.ca> wrote:
I'm really looking for an automated solution.  I suppose I could set
something up using fail2ban to do this, but as I've never installed and
configured that either, I don't know if this would be any easier than
any of the add-on modules for Apache.  For now, the quick addition to my
CGI wrapper script will probably do the trick.

On 18/09/2010 8:09 PM, Brock Wolfe wrote:
>    I prefer the DROP packet by IP ADDRESS solution.  Simple and to the
> point.  Worked really well for me on abusive crawlers from china and
> russia.  8-)
>
> Brock

--
Gilles R. Detillieux              E-mail: <grdetil@scrc.umanitoba.ca>
Spinal Cord Research Centre       WWW:    http://www.scrc.umanitoba.ca/
Dept. Physiology, U. of Manitoba  Winnipeg, MB  R3E 0J9  (Canada)
_______________________________________________
Roundtable mailing list
Roundtable@muug.mb.ca
http://www.muug.mb.ca/mailman/listinfo/roundtable