diff --git a/Shorewall/manpages/shorewall.conf.xml b/Shorewall/manpages/shorewall.conf.xml index 8ea9696ef..90bd2453a 100644 --- a/Shorewall/manpages/shorewall.conf.xml +++ b/Shorewall/manpages/shorewall.conf.xml @@ -971,9 +971,7 @@ When ipset-based dynamic blacklisting is enabled, the contents of the blacklist will be preserved over stop/reboot/start - sequences if SAVE_IPSETS=Yes, SAVE_IPSETS=ipv4 or if - setname is included in the list of sets - to be saved in SAVE_IPSETS. + sequences. diff --git a/docs/blacklisting_support.xml b/docs/blacklisting_support.xml index ec3b6cbed..1197736d1 100644 --- a/docs/blacklisting_support.xml +++ b/docs/blacklisting_support.xml @@ -250,14 +250,36 @@ DROP net:200.55.14.18 all + + + log + + + Added in Shorewall 5.2.5. When specified, successful + 'blacklist' and 'allow' commands will log a message to the system + log. + + + + + noupdate + + + Added in Shorewall 5.2.5. Normally, once an address has been + blacklisted, each time that a packet is received from the packet, + the ipset's entry for the address is updated to reset the timeout to + the value specifyed in the option above. + Setting the option, inhibits this + resetting of the entry's timeout. This option is ignored when the + option is not specified. + + When ipset-based dynamic blacklisting is enabled, the contents of the blacklist will be preserved over stop/reboot/start - sequences if SAVE_IPSETS=Yes, SAVE_IPSETS=ipv4 or if - setname is included in the list of sets to be - saved in SAVE_IPSETS. + sequences.
@@ -275,4 +297,43 @@ DROP net:200.55.14.18 all shorewall show action BLACKLIST command for details.
+ +
+ BLACKLIST and Fail2ban + + The BLACKLIST command can be used as 'blocktype' in + /etc/fail2ban/actions.d/shorewall.conf. Prior to Shorewall 5.2.5, this + works best if there is no timeout + specified in the DYNAMIC_BLACKLIST setting or if timeout=0 is given. + + Beginning with Shorewall 5.2.5, Shorewall includes new features that + allow fail2ban to work most seamlessly with Shorewall's ipset-based + blacklisting: + + + + When a timeout is specified in + the DYNAMIC_BLACKLIST setting, the dynamic-blacklisting ipset is + created with default timeout 0. As entries are added by BLACKLIST + policies or by the blacklist command, + the created entry is given the specified timeout value. + + + + The noupdate option has been + added. Specifying this option prevents 'timeout 0' ipset entries from + being changed to finite timeout entries as a result of blacklisted ip + addresses continuing to send packets to the firewall. + + + + The blacklist! command has been + added. specifying that command as the fail2ban 'blocktype' causes + entries created by fail2ban to persist until fail2ban unbans them + using the Shorewall allow + comand. + + +