Protect hosts from brute force attacks against ssh
http://www.sshguard.net/
Sshguard protects networked hosts from brute force attacks
against ssh servers. It detects such attacks and blocks the
attacker's address with a firewall rule.
- Sources inherited from project openSUSE:Leap:42.3
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Leap:42.3:Update/sshguard && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
sshguard-1.7.1.tar.gz | 0000832220 813 KB | |
sshguard-gcc5.patch | 0000000412 412 Bytes | |
sshguard.changes | 0000005740 5.61 KB | |
sshguard.init | 0000003267 3.19 KB | |
sshguard.service | 0000000987 987 Bytes | |
sshguard.spec | 0000003455 3.37 KB | |
sshguard.sysconfig | 0000001018 1018 Bytes | |
sshguard.whitelist | 0000000220 220 Bytes |
Revision 3 (latest revision is 4)
Ludwig Nussel (lnussel_factory)
accepted
request 459088
from
Wolfgang Rosenauer (wrosenauer)
(revision 3)
Please consider update for 42.3 - Build version 1.7.1 - Add sample Mac OS X 10.12 style launchd.plist - Allow multiple forward slashes in process name - Log released addresses only when debugging - Process validation (``-f`` option) is deprecated - Adjust TIMESTAMP_ISO8601 for Mac OS X 10.12 - Fix build error in hosts backend - Fix empty functions in firewall scripts causing errors with Bash - Flush stdout after every line in sshg-parser - Add *sshg-logtail* - Add *sshg-parser* - Control firewall using *sshg-fw* - Match "no matching key exchange method" for SSH - Hosts backend is deprecated - Logsuck (``-l`` option) is deprecated, use *sshg-logtail* instead - Process validation (``-f`` option) is deprecated - Remove external hooks (``-e`` option) - Remove support for genfilt and ipfilter backends - Accept socklog messages without a timestamp - Fix excessive logging causing endless looping in logsuck - Fix undefined assignment of initial inode number - Match Postfix pre-authentication disconnects - Fix bashisms in iptables backend - Fix size argument in inet_ntop() call - Remove excessive logging when polling from files - Keep looking for unreadable files while polling - Update Dovecot signature for POP3 - Match "Connection reset" message for SSH - Resurrect PID file option by popular demand - Adjust default abuse threshold
Comments 0