Our VPS ran out of memory during a 20-minute vulnerability scan (generating thousands of error log entries) from a single IP address using OpenVAS. On an internal server under my control, it would be easy to block this kind of attack using fail2ban (I use fail2ban to block 100s to 1000s of hostile accesses daily – oddly, it seems like the bad guys mostly took last weekend off). I think that will be tough without sudo access, which, of course, recently went away…
The good folks at DreamHost say this is my problem, and have made it clear that they have no interest in preventing this kind of thing for a VPS. Has anyone else running a DreamHost VPS found reasonable solutions?
Thanks.
–Ken