+1
lib/maintainers.nix
+1
lib/maintainers.nix
···
+2
-1
nixos/modules/module-list.nix
+2
-1
nixos/modules/module-list.nix
···
+140
nixos/modules/services/security/sshguard.nix
+140
nixos/modules/services/security/sshguard.nix
···+Block attackers when their cumulative attack score exceeds threshold. Most attacks have a score of 10.+Blacklist an attacker when its score exceeds threshold. Blacklisted addresses are loaded from and added to blacklist-file.+Blacklist an attacker when its score exceeds threshold. Blacklisted addresses are loaded from and added to blacklist-file.+Block attackers for initially blocktime seconds after exceeding threshold. Subsequent blocks increase by a factor of 1.5.+LOGREADER="LANG=C ${pkgs.systemd}/bin/journalctl -afb -p info -n1 ${toString (map list_services cfg.services)} -o cat"+${pkgs.sshguard}/bin/sshguard -a ${toString cfg.attack_threshold} ${optionalString (cfg.blacklist_threshold != null) "-b ${toString cfg.blacklist_threshold}:${cfg.blacklist_file} "}-i /run/sshguard/sshguard.pid -p ${toString cfg.blocktime} -s ${toString cfg.detection_time} ${toString (map list_whitelist cfg.whitelist)}
+27
pkgs/tools/security/sshguard/0001-Remove-the-unnecessary-from-ipset-cmds.patch
+27
pkgs/tools/security/sshguard/0001-Remove-the-unnecessary-from-ipset-cmds.patch
···
+32
pkgs/tools/security/sshguard/default.nix
+32
pkgs/tools/security/sshguard/default.nix
···+SSHGuard can read log messages from various input sources. Log messages are parsed, line-by-line, for recognized patterns.+If an attack, such as several login failures within a few seconds, is detected, the offending IP is blocked.
+2
pkgs/top-level/all-packages.nix
+2
pkgs/top-level/all-packages.nix