our $grace_period = 3600; # number of seconds that must pass before prior invalid/incorrect attempt counts are reset (1 hour)
our $unblocking_interval = 300; # number of seconds between checks of the blocklist for removing old IPs (5 minutes)
-# Platform specific settings, based on Red Hat Enterprise Linux 5.3
+# Platform specific settings, based on Red Hat Enterprise Linux ES release 3 (Taroon Update 7)
our $logpath = '/var/log/secure'; # logfile to watch
-our $illegal_user_regex = 'sshd\[\d+\]: Failed password for invalid user (\S+) from (\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}) port \d+ ssh';
+our $illegal_user_regex = 'sshd\[\d+\]: Failed password for illegal user (\S+) from (\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}) port \d+ ssh';
our $incorrect_pass_regex = 'sshd\[\d+\]: Failed password for (\S+) from (\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}) port \d+ ssh';
our $iptables = '/sbin/iptables'; # for manipulating the firewall
our $iptables_create = '-N BANSSHEE'; # iptables parameters for creating the BANSSHEE chain
#our $unblocking_interval = 300; # number of seconds between checks of the blocklist for removing old IPs (5 minutes)
#
-# Platform specific settings: based on Red Hat Enterprise Linux 5.3
+# Platform specific settings: based on Red Hat Enterprise Linux ES release 3 (Taroon Update 7)
#
#our $logpath = '/var/log/secure'; # logfile to watch
-#our $illegal_user_regex = 'sshd\[\d+\]: Failed password for invalid user (\S+) from (\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}) port \d+ ssh';
+#our $illegal_user_regex = 'sshd\[\d+\]: Failed password for illegal user (\S+) from (\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}) port \d+ ssh';
#our $incorrect_pass_regex = 'sshd\[\d+\]: Failed password for (\S+) from (\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}) port \d+ ssh';
#our $iptables = '/sbin/iptables'; # for manipulating the firewall
#our $iptables_create = '-N BANSSHEE'; # iptables parameters for creating the BANSSHEE chain