On Tue, 2 Nov 2010, Rob Farmer wrote:
On Tue, Nov 2, 2010 at 10:03, Justin V. <v...@yeaguy.com> wrote:
This is the guide I used:
http://www.sshguard.net/docs/setup/firewall/pf/
I followed this section to block all brute attempts:
Right, but did you do this part too?
http://www.sshguard.net/docs/setup/getlogs/syslog/
The part you mentioned sets up the table and has pf drop the
connection attempts, but you need to configure syslog to fill the
table with IPs of attackers.
--
Rob Farmer
_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "freebsd-questions-unsubscr...@freebsd.org"
Actually this was installed after the port completed:
yeaguy# grep sshg /etc/syslog.conf
auth.info;authpriv.info |exec /usr/local/sbin/sshguard
But it is not exactly what the HOWTO ways, the HOWTO does not mention the
"exec" part.
Put this line high into this file:
auth.info;authpriv.info |/usr/local/sbin/sshguard
_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "freebsd-questions-unsubscr...@freebsd.org"