I have been trying to figure out how to update the timeout of an ipset entry, with no luck so far, when using native ipset I would just simply use:
$ ipset add foo 192.168.0.5 timeout N -exist
but firewalld doesn’t seems to implement this feature according to the manual (man), which is a pretty useful and common.
ip2ban seems to bypass firewalld ipset implmentation and just use it natively, so have I tried but with no success:
$ ipset create foo hash:ip timeout 300
$ firewall-cmd --direct --add-rule ipv4 filter INPUT 0 -p TCP -m multiport --dports 22,443 -m set --match-set foo src -j ACCEPT
$ ipset add foo 184.108.40.206
https requests and ssh connection attemp are dropped with no route to host.
as soon as I disable firewalld i can succeffule send request and connecto to ssh.
I’m using the default zone:
services: cockpit dhcpv6-client ssh
$ firewall-cmd --direct --get-all-rules
ipv4 filter INPUT 0 -p TCP -m multiport --dports 22,443 -m set --match-set foo src -j ACCEPT
what I’m doing wrong, is this possible with firewalld?
thanks in advance