Enable fail2ban in fox
Protect fox against ssh bruteforce attacks: fox% sudo lastb | head root ssh:notty 200.124.28.102 Mon Sep 1 11:25 - 11:25 (00:00) root ssh:notty 200.124.28.102 Mon Sep 1 11:25 - 11:25 (00:00) root ssh:notty 200.124.28.102 Mon Sep 1 11:25 - 11:25 (00:00) root ssh:notty 200.124.28.102 Mon Sep 1 11:25 - 11:25 (00:00) root ssh:notty 200.124.28.102 Mon Sep 1 11:25 - 11:25 (00:00) root ssh:notty 200.124.28.102 Mon Sep 1 11:25 - 11:25 (00:00) root ssh:notty 200.124.28.102 Mon Sep 1 11:25 - 11:25 (00:00) root ssh:notty 200.124.28.102 Mon Sep 1 11:25 - 11:25 (00:00) root ssh:notty 200.124.28.102 Mon Sep 1 11:24 - 11:24 (00:00) root ssh:notty 200.124.28.102 Mon Sep 1 11:24 - 11:24 (00:00) Reviewed-by: Aleix Roca Nonell <aleix.rocanonell@bsc.es>
This commit is contained in:
		
							parent
							
								
									11d389f5c3
								
							
						
					
					
						commit
						8ebc51b33e
					
				| @ -37,6 +37,8 @@ | |||||||
| 
 | 
 | ||||||
|   services.openssh.settings.X11Forwarding = true; |   services.openssh.settings.X11Forwarding = true; | ||||||
| 
 | 
 | ||||||
|  |   services.fail2ban.enable = true; | ||||||
|  | 
 | ||||||
|   # Use SSH tunnel to reach internal hosts |   # Use SSH tunnel to reach internal hosts | ||||||
|   programs.ssh.extraConfig = '' |   programs.ssh.extraConfig = '' | ||||||
|     Host bscpm04.bsc.es gitlab-internal.bsc.es tent |     Host bscpm04.bsc.es gitlab-internal.bsc.es tent | ||||||
|  | |||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user