sshguard no longer adds rule to INPUT chain (regression on upgrade)
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
sshguard (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned |
Bug Description
An Ubuntu 18.04 system with sshguard installed blocks ssh attacks by default, with no additional configuration required. After upgrading to Ubuntu 20.04, attacks no longer get blocked without further action by the user.
sshguard 1.7.1-1 on Ubuntu 18.04 used to add a rule to the iptables INPUT chain on startup (c/o "/usr/lib/
sshguard 2.3.1-1ubuntu1.1 on Ubuntu 20.04 no longer does this. The role of /usr/lib/
sshguard adds rules to this chain to drop packets from offending IP addresses, but nothing actually gets blocked as there is no rule directing any traffic at this chain.
For sshguard to function in 20.04 the user must themselves arrange for the relevant rule to be added to INPUT (e.g. "iptables -I INPUT -j sshguard" on boot). This change is not noted in the changelog, nor in any included documentation.
information type: | Private Security → Public Security |
Changed in sshguard (Ubuntu): | |
status: | New → Confirmed |
Hi Malcom,
Can I make this bug public, so others can check if this is truly a regression?