diff options
author | Andrzej Telszewski <atelszewski@gmail.com> | 2016-08-07 18:12:23 +0700 |
---|---|---|
committer | Willy Sudiarto Raharjo <willysr@slackbuilds.org> | 2016-08-07 18:55:32 +0700 |
commit | dad329af31a51ff390da4168d768bd8e084db420 (patch) | |
tree | daa760583f1aa7ad025859398ad75a4f73192a30 /network/sshguard/README | |
parent | b61d2db033397f507fe79b4277c0d15bfb99dc47 (diff) | |
download | slackbuilds-dad329af31a51ff390da4168d768bd8e084db420.tar.gz |
network/sshguard: Added (SSH brute-force attack protection).
Signed-off-by: Willy Sudiarto Raharjo <willysr@slackbuilds.org>
Diffstat (limited to 'network/sshguard/README')
-rw-r--r-- | network/sshguard/README | 14 |
1 files changed, 14 insertions, 0 deletions
diff --git a/network/sshguard/README b/network/sshguard/README new file mode 100644 index 0000000000..0739e1d5d3 --- /dev/null +++ b/network/sshguard/README @@ -0,0 +1,14 @@ +SSHGuard protects hosts from brute-force attacks against SSH and other services. +It has been written entirely in C and has no external dependencies and no +configuration file. SSHGuard aggregates system logs and blocks repeat offenders. +It can read log messages from standard input (suitable for piping from syslog) +or monitor one or more log files. Log messages are parsed, line-by-line, for +recognized patterns. If an attack, such as several login failures within a few +seconds, is detected, the offending IP is blocked. Offenders are unblocked after +a set interval, but can be semi-permanently banned using the blacklist option. + +IMPORTANT: +You will need to properly set up "sshguard" chain in iptables. For further +information PLEASE CONSULT MAN PAGE installed together with this package. +The information available on the website tends to be outdated, (it is well +worth reading anyway). |