SlackBuilds Repository

15.0 > Network > sshguard (2.4.2)

sshguard protects hosts from brute-force attacks against SSH and other
services. It aggregates system logs and blocks repeat offenders using
one of several firewall backends, including iptables, ipfw, and pf.

sshguard can read log messages from standard input (suitable for piping
from syslog) or monitor one or more log files. Log messages are parsed,
line-by-line, for recognized patterns. If an attack, such as several
login failures within a few seconds, is detected, the offending IP is
blocked. Offenders are unblocked after a set interval, but can be semi-
permanently banned using the blacklist option.


1. You will need to properly set up an "sshguard" chain in your firewall
backend. For further information consult `sshguard-setup(7)`.

2. Starting with version 2.0.0, SSHGuard **requires** a config file
to start. `sshguard.conf` as shipped with this SlackBuild provides
defaults such that they reassemble the values that were previously
specified on the command line in the `rc.sshguard` script.

See `examples/sshguard.conf.sample` in the doc directory for
additional config options.

Maintained by: Andrzej Telszewski
Keywords: brute-force,brute,force,attack,protection,ban,block,iptables,firewall,monitor,log,pattern
ChangeLog: sshguard


Source Downloads:
sshguard-2.4.2.tar.gz (0f83f5e7e1b197fb3bd4e9dfe9e601e6)

Download SlackBuild:
sshguard.tar.gz.asc (FAQ)

(the SlackBuild does not include the source)

Validated for Slackware 15.0

See our HOWTO for instructions on how to use the contents of this repository.

Access to the repository is available via:
ftp git cgit http rsync

© 2006-2023 Project. All rights reserved.
Slackware® is a registered trademark of Patrick Volkerding
Linux® is a registered trademark of Linus Torvalds