Hacker News new | past | comments | ask | show | jobs | submit login

>And don't forget you're using some of those precious CPU cycles to parse the auth logs, with python no less :-)

You can ship the log somewhere else, do the fail2ban there and perform the block action in another place up the stack.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: