@@ -126,7 +126,7 @@ psad::config:
126126127127` ` `
128128
129- ### Can I whitelist or blacklist data ?
129+ ### Can I whitelist or blacklist hosts ?
130130
131131The autodl parameter allows you to set danger levels for specific addresses,
132132protocols and ports.
@@ -203,6 +203,56 @@ In Hiera:
203203psad::firewall_enable : false
204204` ` `
205205
206+ ### How does blocking work?
207+
208+ PSAD adds hosts that meet the criteria for blocking using firewall rules. The
209+ length of time a host is blocked depends on it's "danger level", which is
210+ calculated using SNORT rules and by counting how many packets they've sent to
211+ closed ports.
212+
213+ This module comes with some default values to be used as a starting point.
214+
215+ | Danger Level | Ports Scanned | Time Blocked |
216+ | :----------- | :------------ | :----------- |
217+ | 0 | 0 | 0 |
218+ | 1 | 5 | 1800 |
219+ | 2 | 15 | 3600 |
220+ | 3 | 150 | 21600 |
221+ | 4 | 1500 | 86400 |
222+ | 5 | 10000 | Permanently |
223+
224+
225+ ### Users keep getting blocked from my mail servers!
226+
227+ Some applications, such as Thunderbird, try to be "helpful" by autoconfiguring
228+ themselves. For mail clients like Thunderbird this can involve attempting to
229+ connect to different ports associated with the domain of the email address it
230+ is trying to configure, and if those ports are not open it can look like a port
231+ scan. Consider whitelisting those particular ports setting the IGNORE_PORTS
232+ value.
233+
234+
235+ In Puppet:
236+ ` ` ` puppet
237+ class { 'psad' :
238+ config => {
239+ ignore_ports => ['tcp/25', 'tcp/113']
240+ }
241+ }
242+ ```
243+
244+ In Hiera:
245+ ``` yaml
246+ psad::config :
247+ ignore_ports :
248+ - ' tcp/25'
249+ - ' tcp/113'
250+ ` ` `
251+
252+ ### I'm locked out of my machine!
253+
254+ Find someone who *isn't* locked out and have them run "psad -F" as root. Then
255+ whitelist your machine.
206256
207257
208258## Reference
0 commit comments