opnsense-ports/security/sshguard/files/patch-examples-sshguard.conf.sample
Franco Fichtner 32e4a8f9f2 */*: sync with upstream
Taken from: HardenedBSD
2017-07-21 07:43:36 +02:00

36 lines
1.4 KiB
Text

diff --git examples/sshguard.conf.sample examples/sshguard.conf.sample
index d881e51..87b7acc 100644
--- examples/sshguard.conf.sample
+++ examples/sshguard.conf.sample
@@ -6,11 +6,13 @@
#### REQUIRED CONFIGURATION ####
# Full path to backend executable (required, no default)
-#BACKEND="/usr/local/libexec/sshg-fw-hosts"
+BACKEND="/usr/local/libexec/sshg-fw-null"
+#BACKEND="/usr/local/libexec/sshg-fw-ipfw"
+#BACKEND="/usr/local/libexec/sshg-fw-pf"
# Space-separated list of log files to monitor. Ignored if LOGREADER is set.
# (optional, no default)
-#FILES="/var/log/auth.log /var/log/authlog /var/log/maillog"
+#FILES="/var/log/auth.log /var/log/maillog"
# Shell command that provides logs on standard output. Takes precedence over
# FILES. (optional, no default)
@@ -36,12 +38,12 @@ DETECTION_TIME=1800
# !! Warning: These features may not work correctly with sandboxing. !!
# Full path to PID file (optional, no default)
-#PID_FILE=/run/sshguard.pid
+#PID_FILE=/var/run/sshguard.pid
# Colon-separated blacklist threshold and full path to blacklist file.
# (optional, no default)
-#BLACKLIST_FILE=90:/var/lib/sshguard/enemies
+#BLACKLIST_FILE=30:/var/db/sshguard/blacklist.db
# IP addresses listed in the WHITELIST_FILE are considered to be
# friendlies and will never be blocked.
-#WHITELIST_FILE=/etc/friends
+#WHITELIST_FILE=/usr/local/etc/sshguard.whitelist