opnsense-ports/security/sshguard/files/patch-man_sshguard.8
Franco Fichtner 231976bc25 */*: sync with upstream
Taken from: FreeBSD
2016-05-03 08:22:46 +02:00

27 lines
1.2 KiB
Groff

--- man/sshguard.8.orig 2016-03-17 08:01:48 UTC
+++ man/sshguard.8
@@ -84,7 +84,7 @@ at \fI\%http://www.sshguard.net/\fP\&.
.SH OPTIONS
.INDENT 0.0
.TP
-.B \fB\-a\fP \fIthresh\fP (default 40)
+.B \fB\-a\fP \fIthresh\fP (default 30)
Block an attacker when its dangerousness exceeds \fIthresh\fP\&. Each attack
pattern that is matched contributes a fixed dangerousness of 10.
.TP
@@ -112,13 +112,13 @@ monitor instead. \fBsshguard\fP transpar
using this option, standard input is ignored, but can be re\-added by
giving \(aq\fB\-l\fP \-\(aq.
.TP
-.B \fB\-p\fP \fIinterval\fP (default 420 secs, or 7 minutes)
+.B \fB\-p\fP \fIinterval\fP (default 120 secs, or 2 minutes)
Wait at least \fIinterval\fP seconds before releasing a blocked address.
Repeat attackers are blocked for 1.5 times longer after each attack.
Because \fBsshguard\fP unblocks attackers only at infrequent intervals,
this parameter is inexact (actual blocks will be longer).
.TP
-.B \fB\-s\fP \fIinterval\fP (default 1200 secs, or 20 minutes)
+.B \fB\-s\fP \fIinterval\fP (default 1800 secs, or 30 minutes)
Forget about an attacker \fIinterval\fP seconds after its last attempt. Its
dangerousness will be reset to zero.
.TP