diff options
author | Boris V <david.cla2@gmail.com> | 2017-01-30 19:06:04 +0700 |
---|---|---|
committer | Willy Sudiarto Raharjo <willysr@slackbuilds.org> | 2017-02-03 04:33:11 +0700 |
commit | ceb90dda6ed16f2640fb7f54a66633d9463e5529 (patch) | |
tree | 53a5b18de3df3a59460bf2d03738ab3bc9d71b60 /network/psad/README | |
parent | 97e732d4e19c476dfd06da5d332f98f8d5aa272d (diff) |
network/psad: Added (Intrusion Detection and Log Analysis).
Signed-off-by: Willy Sudiarto Raharjo <willysr@slackbuilds.org>
Diffstat (limited to 'network/psad/README')
-rw-r--r-- | network/psad/README | 27 |
1 files changed, 27 insertions, 0 deletions
diff --git a/network/psad/README b/network/psad/README new file mode 100644 index 000000000000..524336af6145 --- /dev/null +++ b/network/psad/README @@ -0,0 +1,27 @@ +psad (Intrusion Detection and Log Analysis with iptables) + +psad is a collection of three lightweight system daemons (two main +daemons and one helper daemon) that run on Linux machines and analyze +iptables log messages to detect port scans and other suspicious traffic. +A typical deployment is to run psad on the iptables firewall where it has +the fastest access to log data. + +You can set email for alerts by setting ALERTSEMAIL: + +ALERTSEMAIL=alerts@example.com ./psad.SlackBuild + +You need at least these rules: + +iptables -A INPUT -j LOG +iptables -A FORWARD -j LOG + +but more usefull will be something like this: + +iptables -A INPUT -i lo -j ACCEPT +iptables -A INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT +iptables -A INPUT -p tcp --dport 22 -j ACCEPT +iptables -A INPUT -p tcp --dport 80 -j ACCEPT +iptables -A INPUT -j LOG +iptables -A INPUT -j DROP + +please see documentation for more information. |