--- fail2ban-1.0.2/README.Solaris.old 2024-01-17 16:38:53.107504489 -0500 +++ fail2ban-1.0.2/README.Solaris 2024-01-17 16:43:33.623667891 -0500 @@ -120,3 +120,17 @@ * Fail2ban adds lines like these to /etc/hosts.deny: sshd: 1.2.3.4 + +* Solaris IP Filter uses a "last matching rule" algorithm. If the packet + matches a rule containing the "quick" keyword, the action for that rule is + taken and no subsequent rules are checked. This concept is not compatible + with fail2ban. It appends rules at the end of a rule set and will never match + (i.e. block a connection) if an earlier rule matches (i.e. pass a connection) + with quick. If you want an incoming firewall on a system that only supports + incoming web connections, the rules would look like this to support fail2ban: + + block in from any to any + pass in from any to any port = 80 keep state + + fail2ban would then append to the end: + block in quick from x.x.x.x/32 to any