|
From: Kacper W. <ka...@on...> - 2008-09-09 03:59:20
|
Hello all,
I've setup sshguard-pf 1.1 to run through syslog as recommended:
# pkg_info | grep sshguard
sshguard-pf-1.1_1 Protect hosts from brute force attacks against ssh and othe
# cat /etc/syslog.conf | grep sshguard
auth.info;authpriv.info |exec /usr/local/sbin/sshguard
and it reports that it runs fine:
# cat /var/log/auth.log | grep sshguard
Sep 8 12:00:00 interzone sshguard[35281]: Started successfully
[(a,p,s)=(4, 420, 1200)], now ready to scan.
x
Sep 8 12:20:36 interzone sshguard[35281]: Blocking XX.XX.XX.XX: 4
failures over 6 seconds.
Sep 8 12:38:36 interzone sshguard[35281]: Releasing XX.XX.XX.XX after
445 seconds.
(..output cropped for brevity..)
my pf.conf is set up to work with sshguard:
# cat /etc/pf.conf | grep sshguard
table <sshguard> persist
block in quick on $ext_if proto tcp from <sshguard> to any port 22
label "ssh bruteforce"
yet when I look at what pf is doing, I see no addresses added to the
sshguard table, nor do I see any incoming packets blocked through
pflog:
# pfctl -t sshguard -vTshow
No ALTQ support in kernel
ALTQ related functions disabled
# tcpdump -n -e -ttt -i pflog0
listening on pflog0, link-type PFLOG (OpenBSD pflog file), capture size 96 bytes
(nothing)
Now, I'm sure I've fumbled something - why aren't sshguard blocked IPs
being added to the pf table?
TIA,
Kacper Wysocki
--
http://kacper.doesntexist.org
Employ no technique to gain supreme enlightment.
- Mar pa Chos kyi blos gros
|