aboutsummaryrefslogtreecommitdiff
path: root/network/psad/README
diff options
context:
space:
mode:
authorBoris V <david.cla2@gmail.com>2017-01-30 19:06:04 +0700
committerWilly Sudiarto Raharjo <willysr@slackbuilds.org>2017-02-03 04:33:11 +0700
commitceb90dda6ed16f2640fb7f54a66633d9463e5529 (patch)
tree53a5b18de3df3a59460bf2d03738ab3bc9d71b60 /network/psad/README
parent97e732d4e19c476dfd06da5d332f98f8d5aa272d (diff)
network/psad: Added (Intrusion Detection and Log Analysis).
Signed-off-by: Willy Sudiarto Raharjo <willysr@slackbuilds.org>
Diffstat (limited to 'network/psad/README')
-rw-r--r--network/psad/README27
1 files changed, 27 insertions, 0 deletions
diff --git a/network/psad/README b/network/psad/README
new file mode 100644
index 000000000000..524336af6145
--- /dev/null
+++ b/network/psad/README
@@ -0,0 +1,27 @@
+psad (Intrusion Detection and Log Analysis with iptables)
+
+psad is a collection of three lightweight system daemons (two main
+daemons and one helper daemon) that run on Linux machines and analyze
+iptables log messages to detect port scans and other suspicious traffic.
+A typical deployment is to run psad on the iptables firewall where it has
+the fastest access to log data.
+
+You can set email for alerts by setting ALERTSEMAIL:
+
+ALERTSEMAIL=alerts@example.com ./psad.SlackBuild
+
+You need at least these rules:
+
+iptables -A INPUT -j LOG
+iptables -A FORWARD -j LOG
+
+but more usefull will be something like this:
+
+iptables -A INPUT -i lo -j ACCEPT
+iptables -A INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
+iptables -A INPUT -p tcp --dport 22 -j ACCEPT
+iptables -A INPUT -p tcp --dport 80 -j ACCEPT
+iptables -A INPUT -j LOG
+iptables -A INPUT -j DROP
+
+please see documentation for more information.