/etc/arno-iptables-firewall/plugins/ssh-brute-force-protection.conf is in arno-iptables-firewall 2.0.1.c-1.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 | # ------------------------------------------------------------------------------
# -= Arno's iptables firewall - SSH Brute Force Protection plugin =-
# ------------------------------------------------------------------------------
# To actually enable this plugin make ENABLED=1:
# ------------------------------------------------------------------------------
ENABLED=0
# Specify here the port(s) you want the SSH checks to apply to. Note that this
# plugin does NOT open the ports for you, this must be done in the main script
# with eg. OPEN_TCP!
# ------------------------------------------------------------------------------
SSH_BFP_PORTS="22"
# Specify here the hosts you want to allow to bypass the SSH protection checks
# ------------------------------------------------------------------------------
SSH_BFP_TRUSTED_HOSTS=""
# 1st set of maximum allowed connection attempts
# (default: 4 connections/60 seconds)
# ------------------------------------------------------------------------------
SSH_BFP_MAX_RATE1="4"
SSH_BFP_MAX_TIME1="60"
# 2nd set of maximum allowed connection attempts
# (default: 10 connections/1800 seconds)
# ------------------------------------------------------------------------------
SSH_BFP_MAX_RATE2="10"
SSH_BFP_MAX_TIME2="1800"
# (EXPERT SETTING!) If ip6tables '-m recent' IPv6 support is not available:
# Disable (0) if the kernel module xt_recent is not available, only IPv4 will be used.
# ------------------------------------------------------------------------------
SSH_BFP_IPV6_ENABLE=1
|