Command Section

LIBBLACKLIST(3)        FreeBSD Library Functions Manual        LIBBLACKLIST(3)

NAME
     blacklist_open, blacklist_close, blacklist_r, blacklist, blacklist_sa,
     blacklist_sa_r - Blacklistd notification library

LIBRARY
     library "libblacklist"

SYNOPSIS
     #include <blacklist.h>

     struct blacklist *
     blacklist_open(void);

     void
     blacklist_close(struct blacklist *cookie);

     int
     blacklist(int action, int fd, const char *msg);

     int
     blacklist_r(struct blacklist *cookie, int action, int fd,
         const char *msg);

     int
     blacklist_sa(int action, int fd, const struct sockaddr *sa,
         socklen_t salen, const char *msg);

     int
     blacklist_sa_r(struct blacklist *cookie, int action, int fd,
         const struct sockaddr *sa, socklen_t salen, const char *msg);

DESCRIPTION
     These functions can be used by daemons to notify blacklistd(8) about
     successful and failed remote connections so that blacklistd can block or
     release port access to prevent Denial of Service attacks.

     The function blacklist_open() creates the necessary state to communicate
     with blacklistd(8) and returns a pointer to it, or NULL on failure.

     The blacklist_close() function frees all memory and resources used.

     The blacklist() function sends a message to blacklistd(8), with an
     integer action argument specifying the type of notification, a file
     descriptor fd specifying the accepted file descriptor connected to the
     client, and an optional message in the msg argument.

     The action parameter can take these values:

     BLACKLIST_AUTH_FAIL             There was an unsuccessful authentication
                                     attempt.

     BLACKLIST_AUTH_OK               A user successfully authenticated.

     BLACKLIST_ABUSIVE_BEHAVIOR      The sending daemon has detected abusive
                                     behavior from the remote system.  The
                                     remote address should be blocked as soon
                                     as possible.

     BLACKLIST_BAD_USER              The sending daemon has determined the
                                     username presented for authentication is
                                     invalid.  The blacklistd(8) daemon
                                     compares the username to a configured
                                     list of forbidden usernames and blocks
                                     the address immediately if a forbidden
                                     username matches.  (The
                                     BLACKLIST_BAD_USER support is not
                                     currently available.)

     The blacklist_r() function is more efficient because it keeps the
     blacklist state around.

     The blacklist_sa() and blacklist_sa_r() functions can be used with
     unconnected sockets, where getpeername(2) will not work, the server will
     pass the peer name in the message.

     By default, syslogd(8) is used for message logging.  The internal
     bl_create() function can be used to create the required internal state
     and specify a custom logging function.

RETURN VALUES
     The function blacklist_open() returns a cookie on success and NULL on
     failure setting errno to an appropriate value.

     The functions blacklist(), blacklist_sa(), and blacklist_sa_r() return 0
     on success and -1 on failure setting errno to an appropriate value.

SEE ALSO
     blacklistd.conf(5), blacklistd(8)

AUTHORS
     Christos Zoulas

FreeBSD 13.1-RELEASE-p6           May 5, 2017          FreeBSD 13.1-RELEASE-p6

Command Section

man2web Home...