fail2ban (security/fail2ban) Add to my watchlist
Fail2ban protects computer against brute-force attacksFail2ban scans log files (e.g. /var/log/apache/error_log) and bans IPs that show the malicious signs -- too many password failures, seeking for exploits, etc. Generally Fail2Ban then used to update firewall rules to reject the IP addresses for a specified amount of time, although any arbitrary other action (e.g. sending an email, or ejecting CD-ROM tray) could also be configured. Out of the box Fail2Ban comes with filters for various services (apache, curier, ssh, etc).
Version: 0.9.4 License: GPL-2+ GitHubMaintainers | No Maintainer |
Categories | security python |
Homepage | https://www.fail2ban.org/ |
Platforms | {darwin any} |
Variants | - |
"fail2ban" depends on
lib (1)
build (1)
Ports that depend on "fail2ban"
No ports
Port notes
Next step is to configure fail2ban.
Start to read:
${prefix}/etc/fail2ban/fail2ban.conf
${prefix}/etc/fail2ban/jail.conf
and create your own fail2ban.local and jail.local
Start/stop fail2ban with: sudo port [un]load fail2ban
More info at https://www.fail2ban.org/ A startup item has been generated that will aid in starting fail2ban with launchd. It is disabled by default. Execute the following command to start it, and to cause it to launch at startup:
sudo port load fail2ban
Port Health:
Loading Port Health
Installations (30 days)
9
Requested Installations (30 days)
8
Livecheck error
Error: cannot check if fail2ban was updated (regex didn't match)
last updated: 9 hours ago