I recently experienced problems when trying to ban brutte force attacks on the ssh server.
after much research I found out that there are still some improvements that can be implemented, especially to improve the integration with firewalld.
See a discussion here:
06:13AM - 01 Jul 16 UTC
Apologies for not adhering to the bug report format but I'm not creating this issue for a bug.
This is half a...
here is the configuration that finally worked for me, the configuration out-of-the box did not work.:
the problem is that webmin sets firewalld as the banning method and this is apparently incompatible with iptables. This is the configuration that finally worked:
with this as default:
By the way, apparently there is a better solution for using firewalld, see the discussion here:
maybe the webmin developers want to consider this?
after much research
Interesting. I’m relatively new to both Firewalld and Fail2ban (after years of being spoiled by APF & BFD). Although I’ve never had a lick of trouble using them on CentOS, your trouble shooting ought to be helpful for others using Debian. Nice work and glad you got it working.
This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.