Hello,
I got some really valuable help earlier, improving pf rules for a web server, thanks again for that.
I want to continue try making the life hard for some malicious beings out there.
Example:
Eventually they will find the open SSH port.
The password is luckily so long and complicated, it's impossible to even remember.
But I feel the need of installing security/py-fail2ban or similar, to stop the scans for open ports.
I saw that it was important to add
Is there anything else good knowing before starting setting up fail2ban?
Thank you,
I got some really valuable help earlier, improving pf rules for a web server, thanks again for that.
I want to continue try making the life hard for some malicious beings out there.
Example:
tcpdump -n -e -ttt -r /var/log/pflog
Code:
00:00:03.008672 rule 16/0(match): block in on vmx0: 141.98.10.136.51361 > 203.0.113.254: Flags [SEW]
00:00:05.999539 rule 16/0(match): block in on vmx0: 141.98.10.136.51361 > 203.0.113.254: Flags [S]
00:06:42.195216 rule 16/0(match): block in on vmx0: 141.98.10.235.56255 > 203.0.113.254: Flags [SEW]
00:00:02.986042 rule 16/0(match): block in on vmx0: 141.98.10.235.56255 > 203.0.113.254: Flags [SEW]
Eventually they will find the open SSH port.
The password is luckily so long and complicated, it's impossible to even remember.
But I feel the need of installing security/py-fail2ban or similar, to stop the scans for open ports.
I saw that it was important to add
anchor "f2b/*"
when configuring pf.conf.Is there anything else good knowing before starting setting up fail2ban?
Thank you,