On Sun, 2021-02-21 at 20:01 +0100, Michael Biebl wrote: > Unfortunately I have no idea what sshguard is. > Is that another firewall?
I expect you've found out yourself by now, but fwiw, sshguard adds brute-force protection to ssh. It analyses log files for signs of brute force attempts and updates firewall rules to block connections as appropriate. > Does it install iptables / nftables rules (which might clash with > firewalld). The latest package version uses the nftables backend. Setup when using firewalld involves adding a couple of rich-rules as below. I do not know what sshguard specifically does internally to make things work, but some part of this setup, presumably with the switch to nftables, is clearly broken. > What exactly do you mean with "sshguard config"? The sshguard firewalld config is described in [1] & [2], and is essentially this: 1. # firewall-cmd --zone=zone-name --permanent --add-rich-rule="rule source ipset=sshguard4 drop" 2. # firewall-cmd --zone=zone-name --permanent --add-rich-rule="rule source ipset=sshguard6 drop" [1]: https://manpages.debian.org/testing/sshguard/sshguard-setup.7.en.html [2]: https://wiki.archlinux.org/index.php/Sshguard On Sun, 2021-02-21 at 20:10 +0100, Michael Biebl wrote: > After looking at the package description, I think this is a sshguard > issue. Ok, fair enough :) > Looking at the git log of sshguard, maybe upgrading to a newer > sshguard > version helps. > It has commits like > > https://bitbucket.org/sshguard/sshguard/commits/5927e696a8f0bc323f66d1edcce1365a70972320 > which look related. Indeed that does look very much related and I agree that it would be good to test a newer version of sshguard with those changes to see if that resolves it. I was too exhausted yesterday to think about looking at sshguard developments; sorry about that.