Skip to content
This repository was archived by the owner on Aug 7, 2025. It is now read-only.

Commit 6746c4a

Browse files
committed
v20
1 parent 7b700cf commit 6746c4a

3 files changed

Lines changed: 9 additions & 6 deletions

File tree

configure.ac

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
# Process this file with autoconf to produce a configure script.
33

44
AC_PREREQ([2.64])
5-
AC_INIT([tallow], [19], [auke-jan.h.kok@intel.com])
5+
AC_INIT([tallow], [20], [auke-jan.h.kok@intel.com])
66
AM_INIT_AUTOMAKE([foreign -Wall -Werror -Wno-portability silent-rules subdir-objects color-tests
77
no-dist-gzip dist-xz])
88
AC_CONFIG_FILES([Makefile])

man/tallow.1

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
.\" generated with Ronn/v0.7.3
22
.\" http://github.com/rtomayko/ronn/tree/0.7.3
33
.
4-
.TH "TALLOW" "1" "October 2018" "" ""
4+
.TH "TALLOW" "1" "February 2020" "" ""
55
.
66
.SH "NAME"
77
\fBtallow\fR
@@ -31,7 +31,7 @@ The \fBtallow\fR daemon itself has no runtime configuration\. All configuration
3131
The \fBUSR1\fR signal causes \fBtallow\fR to print out it\'s internal tracking table of IP addresses\. This requires that tallow is compiled with the \fB\-DDEBUG=1\fR symbol passed to the compiler\.
3232
.
3333
.SH "SEE ALSO"
34-
systemd\-journald(1), iptables(1), ipset(1), tallow\.conf(5)
34+
systemd\-journald(1), iptables(1), ipset(1), tallow\.conf(5), tallow\.patterns(5)
3535
.
3636
.SH "BUGS"
3737
\fBtallow\fR is \fBNOT A SECURITY SOLUTION\fR, nor does it protect against random password logins\. A attacker may still be able to logon to your systems if you allow password logins\.

man/tallow.conf.5

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
.\" generated with Ronn/v0.7.3
22
.\" http://github.com/rtomayko/ronn/tree/0.7.3
33
.
4-
.TH "TALLOW" "5" "October 2019" "" ""
4+
.TH "TALLOW" "5" "February 2020" "" ""
55
.
66
.SH "NAME"
77
\fBtallow\fR
@@ -19,7 +19,10 @@ tallow\.conf \- Tallow daemon configuration file
1919
This file is read on startup by the tallow(1) daemon, and can be used to provide options to the tallow daemon\. If not present, tallow will operate with built\-in defaults\.
2020
.
2121
.SH "OPTIONS"
22-
\fBipt_path\fR=\fB<string>\fR Specifies the location of the ipset(1) program and iptables(1), ip6tables(1), or firewall\-cmd(1) programs\. By default, tallow will look in "/usr/sbin" for them\.
22+
\fBfwcmd_path\fR=\fB<string>\fR Specifies the location of the ipset(1) firewall\-cmd(1) programs\. By default, tallow will look in "/usr/sbin" for them\.
23+
.
24+
.P
25+
\fBipt_path\fR=\fB<string>\fR Specifies the location of the ipset(1) program and iptables(1) or ip6tables(1) programs\. By default, tallow will look in "/usr/sbin" for them\.
2326
.
2427
.P
2528
\fBexpires\fR=\fB<int>\fR The number of seconds that IP addresses are blocked for\. Note that due to the implementation, IP addresses may be blocked for much longer than this period\. If IP addresses are seen, but not blocked within this period, they are also removed from the watch list\. Defaults to 3600s\.
@@ -71,7 +74,7 @@ Use the following commands if you\'re using firewalld(1):
7174
.IP "" 0
7275
.
7376
.SH "SEE ALSO"
74-
tallow(1)
77+
tallow(1), tallow\.patterns(5)
7578
.
7679
.SH "AUTHOR"
7780
Auke Kok \fIauke\-jan\.h\.kok@intel\.com\fR

0 commit comments

Comments
 (0)