Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DOSLogDir is an abuse vector itself #16

Open
bellwood opened this issue Aug 9, 2021 · 0 comments
Open

DOSLogDir is an abuse vector itself #16

bellwood opened this issue Aug 9, 2021 · 0 comments

Comments

@bellwood
Copy link

bellwood commented Aug 9, 2021

Being that each attack source is written to an individual file in DOSLogDir, this leaves the machine open to inode abuse due to the sheer volume of files that can/will be created and apparently never cleaned up.

DOSLogdir
Directory where lock files will be created to prevent continuous emails from being sent or system commands from getting executed

However, even if DOSEmailNotify or DOSSystemCommand are commented out, these files are still created.

It would be great to simply let the module use syslog in this case.

Edit: Perhaps adding a cleanup routine to the module to remove the related DOSLogDir files when the associated hash table entry expires would be prudent here as well.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant