Date: Tue, 04 Nov 2014 22:56:32 +0100 From: "Michael Ross" <gmx@ross.cx> To: "Charlie Root" <root@ymer.thorshammare.org>, "Lowell Gilbert" <freebsd-questions-local@be-well.ilk.org>, freebsd-questions@freebsd.org Subject: Re: sshguard pf Message-ID: <op.xotlwiezg7njmm@michael-think.fritz.box> In-Reply-To: <44oasm7l6f.fsf@lowell-desk.lan> References: <20141102154444.GA42429@ymer.thorshammare.org> <54581F0E.4080404@a1poweruser.com> <20141104110202.GA37003@ymer.thorshammare.org> <44vbmv6kyp.fsf@lowell-desk.lan> <20141104193652.GA3062@ymer.thorshammare.org> <44oasm7l6f.fsf@lowell-desk.lan>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 04 Nov 2014 21:41:44 +0100, Lowell Gilbert
<freebsd-questions-local@be-well.ilk.org> wrote:
> Charlie Root <root@ymer.thorshammare.org> writes:
>
>> Do "bruteblock" require me to run ipfw2 as my firewall ?
>
> Yes. That's why I mentioned that there are several other options, I just
> don't know them myself.
>
> Last I checked, bruteblock doesn't support IPv6 either, so one of these
> days I may have to check into the choices again.
For the record, I use fail2ban,
and setting it up was painless, and it will support pf.
Quick-How-To:
1. Install fail2ban
2. Create file /usr/local/etc/fail2ban/jail.local
[sshd]
enabled = true
action = pf
port = ssh
logpath = %(sshd_log)s
[sshd-ddos]
enabled = true
action = pf
port = ssh
logpath = %(sshd_log)s
3. Modify /usr/local/etc/fail2ban/action.d/pf.conf
You need the correct path to pfctl in "actionban" and "actionunban"
and the correct tablename in the [Init] section at the end.
4. service fail2ban onestart
> _______________________________________________
> freebsd-questions@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to
> "freebsd-questions-unsubscribe@freebsd.org"
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?op.xotlwiezg7njmm>
