Skip to content
This repository was archived by the owner on Aug 7, 2025. It is now read-only.
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 6 additions & 6 deletions man/tallow.1.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,11 +5,11 @@

Reduce log clutter due to ssh login attempts.

# SYNOPSIS
## SYNOPSIS

`/usr/sbin/tallow`

# DESCRIPTION
## DESCRIPTION

`tallow` is a daemon that watches the systemd journal for messages
from the `sshd` service. It parses the messages and looks for
Expand Down Expand Up @@ -37,22 +37,22 @@ blocked inadvertently. You may wish to list any valid IP address
with the whitelist option in tallow.conf(5). Multiple addresses can
be whitelisted.

# OPTIONS
## OPTIONS

The `tallow` daemon itself has no runtime configuration. All
configuration is done through the tallow.conf(5) config file.

# SIGNALS
## SIGNALS

The `USR1` signal causes `tallow` to print out it's internal tracking
table of IP addresses. This requires that tallow is compiled with
the `-DDEBUG=1` symbol passed to the compiler.

# SEE ALSO
## SEE ALSO

systemd-journald(1), iptables(1), ipset(1), tallow.conf(5), tallow.patterns(5)

# BUGS
## BUGS

`tallow` is `NOT A SECURITY SOLUTION`, nor does it protect against
random password logins. A attacker may still be able to logon to your
Expand Down
10 changes: 5 additions & 5 deletions man/tallow.conf.5.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,21 +5,21 @@

The tallow configuration file

# NAME
## NAME

tallow.conf - Tallow daemon configuration file

# SYNOPSIS
## SYNOPSIS

`/etc/tallow.conf`

# DESCRIPTION
## DESCRIPTION

This file is read on startup by the tallow(1) daemon, and can
be used to provide options to the tallow daemon. If not present,
tallow will operate with built-in defaults.

# OPTIONS
## OPTIONS

`fwcmd_path`=`<string>`
Specifies the location of the ipset(1) firewall-cmd(1) programs. By
Expand Down Expand Up @@ -87,6 +87,6 @@ Use the following commands if you're using firewalld(1):

```

# SEE ALSO
## SEE ALSO

tallow(1), tallow.patterns(5)
12 changes: 6 additions & 6 deletions man/tallow.patterns.5.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
Tallow pattern matching configuration files.


# SYNOPSIS
## SYNOPSIS

tallow(1) uses regular expressions to match journal entries and extract an IP
address from them. JSON files are used to configure the patterns and banning
Expand All @@ -16,7 +16,7 @@ thresholds used by tallow(1).
`/usr/share/tallow/*.json`


# DESCRIPTION
## DESCRIPTION

tallow(1) uses regular expressions to match journal entries and extract an IP
address from them. JSON files are used to configure the patterns and banning
Expand All @@ -31,7 +31,7 @@ files under `/etc/tallow`. The default JSON files can be overridden by creating
the same file under `/etc/tallow`.


# FILE FORMAT
## FILE FORMAT

Pattern configuration files use the JavaScript Object Notation (JSON) format.

Expand Down Expand Up @@ -61,7 +61,7 @@ object is an array containing objects with a `filter` key and an `items` key.
See systemd.journal-fields(7) for valid journal fields.


# EXAMPLES
## EXAMPLES

1. The JSON below is a snippet from one of the default pattern configuration
files for blocking certain failed `sshd` connections.
Expand Down Expand Up @@ -122,12 +122,12 @@ object is an array containing objects with a `filter` key and an `items` key.
```


# SEE ALSO
## SEE ALSO

tallow(1), tallow.conf(5)


# BUGS
## BUGS

`tallow` is `NOT A SECURITY SOLUTION`, nor does it protect against random
password logins. An attacker may still be able to logon to your systems if you
Expand Down