ping-conditional SSH firewall
Go to file
2024-06-27 15:21:19 +02:00
DEBIAN Init 2024-06-19 23:23:15 +02:00
etc Init 2024-06-19 23:23:15 +02:00
usr/sbin Only log changes 2024-06-27 15:21:19 +02:00
.gitignore Init 2024-06-19 23:23:15 +02:00
LICENSE Init 2024-06-19 23:23:15 +02:00
README.md Init 2024-06-19 23:23:15 +02:00

sshutter

Apply firewall rules depending on ping results

Motivation

SSH is, by nature, a very powerful and mighty tool which can be found on almost any UNIX system - and some Windows hosts, too. However, incidents like the XZ backdoor have shown that SSH is not invulnerable, and a critical vulnerability would be as desastrous as EternalBlue on Windows hosts.

This situation asks for dynamic solutions. And sshutter is such a dynamic solution. It activates or deactivates firewall rules for dropping requests to SSH as long as a certain IP address or network is reachable.

Building/Packing

To create the Debian/Ubuntu package for sshutter, run dpkg-deb --root-owner-group --build . sshutter-v0.1.deb