Protect from brute force attacks against SSH
Formula code on GitHub
|bottle||🍾||mojave, high_sierra, sierra|
|Add the following lines to /etc/pf.conf to block entries in the sshguard
table (replace $ext_if with your WAN interface):
table <sshguard> persist
block in quick on $ext_if proto tcp from <sshguard> to any port 22 label "ssh bruteforce"
Then run sudo pfctl -f /etc/pf.conf to reload the rules.
|Installs (30 days)|
|Installs on Request (30 days)|
|Build Errors (30 days)|
|Installs (90 days)|
|Installs on Request (90 days)|
|Installs (365 days)|
|Installs on Request (365 days)|