This unit is provided by:
Options
-
[Install]-
WantedBy=multi-user.target
-
-
[Service]-
EnvironmentFile=-/etc/sshguard.conf -
ExecReload=/bin/kill -HUP $MAINPID -
ExecStart=/usr/sbin/sshguard -
ExecStart=/usr/sbin/sshguard -a $THRESHOLD -p $BLOCK_TIME -s $DETECTION_TIME -w $WHITELIST_FILE -b $BLACKLIST_FILE -
ExecStartPre=-/usr/sbin/nft add table ip sshguard -/usr/sbin/nft add table ip6 sshguard -
ExecStopPost=-/usr/sbin/nft delete table ip sshguard -/usr/sbin/nft delete table ip6 sshguard -
KillMode=process -
PIDFile=/run/sshguard.pid -
PrivateDevicesIntroduced in systemd 209=yes -
ProtectClockIntroduced in systemd 245=yes -
ProtectControlGroupsIntroduced in systemd 232=yes -
ProtectHomeIntroduced in systemd 214=yes -
ProtectHostnameIntroduced in systemd 242=yes -
ProtectKernelLogsIntroduced in systemd 244=yes -
ProtectKernelModulesIntroduced in systemd 232=yes -
ProtectKernelTunablesIntroduced in systemd 232=yes -
ProtectSystemIntroduced in systemd 214=full -
Restart=always -
RestrictRealtimeIntroduced in systemd 231=yes
-
-
[Unit]-
After=network.target -
After=syslog.target iptables.service ip6tables.service libvirtd.service firewalld.service nftables.service -
After=syslog.target iptables.target ip6tables.target libvirtd.service firewalld.service -
Before=sshd.service -
Description=SSHGUARD provides automatic attack blocking -
Description=SSHGuard -
Description=SSHGuard - blocks brute-force login attempts -
Documentation=man:sshguard(8)
-
Additionnal notes
Nothing here.