This file is indexed.

/etc/arno-iptables-firewall/plugins/ssh-brute-force-protection.conf is in arno-iptables-firewall 2.0.1.c-1.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
# ------------------------------------------------------------------------------
#      -= Arno's iptables firewall - SSH Brute Force Protection plugin =-
# ------------------------------------------------------------------------------

# To actually enable this plugin make ENABLED=1:
# ------------------------------------------------------------------------------
ENABLED=0

# Specify here the port(s) you want the SSH checks to apply to. Note that this
# plugin does NOT open the ports for you, this must be done in the main script
# with eg. OPEN_TCP!
# ------------------------------------------------------------------------------
SSH_BFP_PORTS="22"

# Specify here the hosts you want to allow to bypass the SSH protection checks
# ------------------------------------------------------------------------------
SSH_BFP_TRUSTED_HOSTS=""

# 1st set of maximum allowed connection attempts
# (default: 4 connections/60 seconds)
# ------------------------------------------------------------------------------
SSH_BFP_MAX_RATE1="4"
SSH_BFP_MAX_TIME1="60"

# 2nd set of maximum allowed connection attempts
# (default: 10 connections/1800 seconds)
# ------------------------------------------------------------------------------
SSH_BFP_MAX_RATE2="10"
SSH_BFP_MAX_TIME2="1800"

# (EXPERT SETTING!) If ip6tables '-m recent' IPv6 support is not available:
# Disable (0) if the kernel module xt_recent is not available, only IPv4 will be used.
# ------------------------------------------------------------------------------
SSH_BFP_IPV6_ENABLE=1