Skip to content

Instantly share code, notes, and snippets.

@DanielO
Created June 19, 2020 01:07
Show Gist options
  • Save DanielO/52aaf28e059dea92f482de7b634794f7 to your computer and use it in GitHub Desktop.
Save DanielO/52aaf28e059dea92f482de7b634794f7 to your computer and use it in GitHub Desktop.
#### REQUIRED CONFIGURATION ####
# Full path to backend executable (required, no default)
BACKEND="/usr/lib/arm-linux-gnueabihf/sshg-fw-nft-sets"
# Shell command that provides logs on standard output. (optional, no default)
# Example 1: ssh and sendmail from systemd journal:
LOGREADER="LANG=C /bin/journalctl -afb -p info -n1 -o cat SYSLOG_FACILITY=4 SYSLOG_FACILITY=10"
#### OPTIONS ####
# Block attackers when their cumulative attack score exceeds THRESHOLD.
# Most attacks have a score of 10. (optional, default 30)
THRESHOLD=30
# Block attackers for initially BLOCK_TIME seconds after exceeding THRESHOLD.
# Subsequent blocks increase by a factor of 1.5. (optional, default 120)
BLOCK_TIME=120
# Remember potential attackers for up to DETECTION_TIME seconds before
# resetting their score. (optional, default 1800)
DETECTION_TIME=1800
# IP addresses listed in the WHITELIST_FILE are considered to be
# friendlies and will never be blocked.
WHITELIST_FILE=/etc/sshguard/whitelist
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment