Subversion Repositories configs

Rev

Rev 75 | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
3 - 1
#
37 - 2
# WARNING: heavily refactored in 0.9.0 release.  Please review and
3
#          customize settings for your setup.
4
#
5
# Changes:  in most of the cases you should not modify this
6
#           file, but provide customizations in jail.local file,
7
#           or separate .conf files under jail.d/ directory, e.g.:
8
#
6 - 9
# HOW TO ACTIVATE JAILS:
3 - 10
#
6 - 11
# YOU SHOULD NOT MODIFY THIS FILE.
3 - 12
#
37 - 13
# It will probably be overwritten or improved in a distribution update.
6 - 14
#
15
# Provide customizations in a jail.local file or a jail.d/customisation.local.
16
# For example to change the default bantime for all jails and to enable the
17
# ssh-iptables jail the following (uncommented) would appear in the .local file.
18
# See man 5 jail.conf for details.
19
#
3 - 20
# [DEFAULT]
21
# bantime = 3600
22
#
37 - 23
# [sshd]
3 - 24
# enabled = true
37 - 25
#
26
# See jail.conf(5) man page for more information
3 - 27
 
6 - 28
 
29
 
30
# Comments: use '#' for comment lines and ';' (following a space) for inline comments
31
 
37 - 32
 
33
[INCLUDES]
34
 
35
#before = paths-distro.conf
36
before = paths-fedora.conf
37
 
3 - 38
# The DEFAULT allows a global definition of the options. They can be overridden
39
# in each jail afterwards.
40
 
41
[DEFAULT]
42
 
37 - 43
#
44
# MISCELLANEOUS OPTIONS
45
#
46
 
3 - 47
# "ignoreip" can be an IP address, a CIDR mask or a DNS host. Fail2ban will not
48
# ban a host which matches an address in this list. Several addresses can be
75 - 49
# defined using space (and/or comma) separator.
3 - 50
ignoreip = 127.0.0.1/8
51
 
6 - 52
# External command that will take an tagged arguments to ignore, e.g. <ip>,
53
# and return true if the IP is to be ignored. False otherwise.
54
#
55
# ignorecommand = /path/to/command <ip>
56
ignorecommand =
57
 
3 - 58
# "bantime" is the number of seconds that a host is banned.
59
bantime  = 600
60
 
61
# A host is banned if it has generated "maxretry" during the last "findtime"
62
# seconds.
63
findtime  = 600
64
 
65
# "maxretry" is the number of failures before a host get banned.
37 - 66
maxretry = 5
3 - 67
 
68
# "backend" specifies the backend used to get files modification.
37 - 69
# Available options are "pyinotify", "gamin", "polling", "systemd" and "auto".
3 - 70
# This option can be overridden in each jail as well.
71
#
72
# pyinotify: requires pyinotify (a file alteration monitor) to be installed.
73
#              If pyinotify is not installed, Fail2ban will use auto.
74
# gamin:     requires Gamin (a file alteration monitor) to be installed.
75
#              If Gamin is not installed, Fail2ban will use auto.
76
# polling:   uses a polling algorithm which does not require external libraries.
37 - 77
# systemd:   uses systemd python library to access the systemd journal.
78
#              Specifying "logpath" is not valid for this backend.
79
#              See "journalmatch" in the jails associated filter config
3 - 80
# auto:      will try to use the following backends, in order:
81
#              pyinotify, gamin, polling.
37 - 82
#
75 - 83
# Note: if systemd backend is chosen as the default but you enable a jail
37 - 84
#       for which logs are present only in its own log files, specify some other
85
#       backend for that jail (e.g. polling) and provide empty value for
86
#       journalmatch. See https://github.com/fail2ban/fail2ban/issues/959#issuecomment-74901200
3 - 87
backend = auto
88
 
89
# "usedns" specifies if jails should trust hostnames in logs,
90
#   warn when DNS lookups are performed, or ignore all hostnames in logs
91
#
92
# yes:   if a hostname is encountered, a DNS lookup will be performed.
93
# warn:  if a hostname is encountered, a DNS lookup will be performed,
94
#        but it will be logged as a warning.
95
# no:    if a hostname is encountered, will not be used for banning,
96
#        but it will be logged as info.
86 - 97
# raw:   use raw value (no hostname), allow use it for no-host filters/actions (example user)
3 - 98
usedns = warn
99
 
37 - 100
# "logencoding" specifies the encoding of the log files handled by the jail
101
#   This is used to decode the lines from the log file.
102
#   Typical examples:  "ascii", "utf-8"
103
#
104
#   auto:   will use the system locale setting
105
logencoding = auto
3 - 106
 
37 - 107
# "enabled" enables the jails.
108
#  By default all jails are disabled, and it should stay this way.
109
#  Enable only relevant to your setup jails in your .local or jail.d/*.conf
110
#
111
# true:  jail will be enabled and log files will get monitored for changes
112
# false: jail is not enabled
113
enabled = false
3 - 114
 
6 - 115
 
37 - 116
# "filter" defines the filter to use by the jail.
117
#  By default jails have names matching their filter name
118
#
119
filter = %(__name__)s
6 - 120
 
121
 
37 - 122
#
123
# ACTIONS
124
#
6 - 125
 
37 - 126
# Some options used for actions
6 - 127
 
37 - 128
# Destination email address used solely for the interpolations in
129
# jail.{conf,local,d/*} configuration files.
130
destemail = root@localhost
6 - 131
 
37 - 132
# Sender email address used solely for some actions
133
sender = root@localhost
3 - 134
 
37 - 135
# E-mail action. Since 0.8.1 Fail2Ban uses sendmail MTA for the
136
# mailing. Change mta configuration parameter to mail if you want to
137
# revert to conventional 'mail'.
138
mta = sendmail
3 - 139
 
37 - 140
# Default protocol
141
protocol = tcp
6 - 142
 
37 - 143
# Specify chain where jumps would need to be added in iptables-* actions
144
chain = INPUT
6 - 145
 
37 - 146
# Ports to be banned
147
# Usually should be overridden in a particular jail
148
port = 0:65535
6 - 149
 
75 - 150
# Format of user-agent https://tools.ietf.org/html/rfc7231#section-5.5.3
151
fail2ban_agent = Fail2Ban/%(fail2ban_version)s
152
 
37 - 153
#
154
# Action shortcuts. To be used to define action parameter
6 - 155
 
37 - 156
# Default banning action (e.g. iptables, iptables-new,
157
# iptables-multiport, shorewall, etc) It is used to define
158
# action_* variables. Can be overridden globally or per
159
# section within jail.local file
160
banaction = iptables-multiport
75 - 161
banaction_allports = iptables-allports
6 - 162
 
37 - 163
# The simplest action to take: ban only
164
action_ = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
6 - 165
 
37 - 166
# ban & send an e-mail with whois report to the destemail.
167
action_mw = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
75 - 168
            %(mta)s-whois[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", protocol="%(protocol)s", chain="%(chain)s"]
6 - 169
 
37 - 170
# ban & send an e-mail with whois report and relevant log lines
171
# to the destemail.
172
action_mwl = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
75 - 173
             %(mta)s-whois-lines[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", logpath=%(logpath)s, chain="%(chain)s"]
3 - 174
 
37 - 175
# See the IMPORTANT note in action.d/xarf-login-attack for when to use this action
176
#
177
# ban & send a xarf e-mail to abuse contact of IP address and include relevant log lines
178
# to the destemail.
179
action_xarf = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
180
             xarf-login-attack[service=%(__name__)s, sender="%(sender)s", logpath=%(logpath)s, port="%(port)s"]
3 - 181
 
44 - 182
# ban IP on CloudFlare & send an e-mail with whois report and relevant log lines
183
# to the destemail.
184
action_cf_mwl = cloudflare[cfuser="%(cfemail)s", cftoken="%(cfapikey)s"]
75 - 185
                %(mta)s-whois-lines[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", logpath=%(logpath)s, chain="%(chain)s"]
6 - 186
 
37 - 187
# Report block via blocklist.de fail2ban reporting service API
188
#
189
# See the IMPORTANT note in action.d/blocklist_de.conf for when to
190
# use this action. Create a file jail.d/blocklist_de.local containing
191
# [Init]
192
# blocklist_de_apikey = {api key from registration]
193
#
75 - 194
action_blocklist_de  = blocklist_de[email="%(sender)s", service=%(filter)s, apikey="%(blocklist_de_apikey)s", agent="%(fail2ban_agent)s"]
6 - 195
 
37 - 196
# Report ban via badips.com, and use as blacklist
197
#
198
# See BadIPsAction docstring in config/action.d/badips.py for
199
# documentation for this action.
200
#
201
# NOTE: This action relies on banaction being present on start and therefore
202
# should be last action defined for a jail.
203
#
75 - 204
action_badips = badips.py[category="%(__name__)s", banaction="%(banaction)s", agent="%(fail2ban_agent)s"]
205
#
206
# Report ban via badips.com (uses action.d/badips.conf for reporting only)
207
#
208
action_badips_report = badips[category="%(__name__)s", agent="%(fail2ban_agent)s"]
6 - 209
 
37 - 210
# Choose default action.  To change, just override value of 'action' with the
211
# interpolation to the chosen action shortcut (e.g.  action_mw, action_mwl, etc) in jail.local
212
# globally (section [DEFAULT]) or per specific section
213
action = %(action_)s
6 - 214
 
215
 
37 - 216
#
217
# JAILS
218
#
6 - 219
 
37 - 220
#
221
# SSH servers
222
#
6 - 223
 
37 - 224
[sshd]
6 - 225
 
37 - 226
port    = ssh
227
logpath = %(sshd_log)s
75 - 228
backend = %(sshd_backend)s
6 - 229
 
230
 
37 - 231
[sshd-ddos]
232
# This jail corresponds to the standard configuration in Fail2ban.
233
# The mail-whois action send a notification e-mail with a whois request
234
# in the body.
235
port    = ssh
236
logpath = %(sshd_log)s
75 - 237
backend = %(sshd_backend)s
6 - 238
 
239
 
37 - 240
[dropbear]
6 - 241
 
37 - 242
port     = ssh
243
logpath  = %(dropbear_log)s
75 - 244
backend  = %(dropbear_backend)s
6 - 245
 
246
 
37 - 247
[selinux-ssh]
6 - 248
 
37 - 249
port     = ssh
250
logpath  = %(auditd_log)s
3 - 251
 
252
 
37 - 253
#
254
# HTTP servers
255
#
6 - 256
 
37 - 257
[apache-auth]
3 - 258
 
37 - 259
port     = http,https
260
logpath  = %(apache_error_log)s
6 - 261
 
262
 
37 - 263
[apache-badbots]
264
# Ban hosts which agent identifies spammer robots crawling the web
265
# for email addresses. The mail outputs are buffered.
266
port     = http,https
267
logpath  = %(apache_access_log)s
268
bantime  = 172800
269
maxretry = 1
3 - 270
 
271
 
37 - 272
[apache-noscript]
6 - 273
 
37 - 274
port     = http,https
275
logpath  = %(apache_error_log)s
3 - 276
 
277
 
37 - 278
[apache-overflows]
6 - 279
 
37 - 280
port     = http,https
281
logpath  = %(apache_error_log)s
282
maxretry = 2
3 - 283
 
284
 
37 - 285
[apache-nohome]
6 - 286
 
37 - 287
port     = http,https
288
logpath  = %(apache_error_log)s
289
maxretry = 2
6 - 290
 
3 - 291
 
37 - 292
[apache-botsearch]
6 - 293
 
37 - 294
port     = http,https
295
logpath  = %(apache_error_log)s
296
maxretry = 2
6 - 297
 
3 - 298
 
37 - 299
[apache-fakegooglebot]
6 - 300
 
37 - 301
port     = http,https
302
logpath  = %(apache_access_log)s
303
maxretry = 1
304
ignorecommand = %(ignorecommands_dir)s/apache-fakegooglebot <ip>
3 - 305
 
306
 
6 - 307
[apache-modsecurity]
308
 
37 - 309
port     = http,https
310
logpath  = %(apache_error_log)s
6 - 311
maxretry = 2
312
 
75 - 313
 
37 - 314
[apache-shellshock]
6 - 315
 
37 - 316
port    = http,https
317
logpath = %(apache_error_log)s
318
maxretry = 1
6 - 319
 
75 - 320
 
321
[openhab-auth]
322
 
323
filter = openhab
324
action = iptables-allports[name=NoAuthFailures]
325
logpath = /opt/openhab/logs/request.log
326
 
327
 
37 - 328
[nginx-http-auth]
6 - 329
 
37 - 330
port    = http,https
331
logpath = %(nginx_error_log)s
6 - 332
 
75 - 333
# To use 'nginx-limit-req' jail you should have `ngx_http_limit_req_module`
334
# and define `limit_req` and `limit_req_zone` as described in nginx documentation
335
# http://nginx.org/en/docs/http/ngx_http_limit_req_module.html
336
# or for example see in 'config/filter.d/nginx-limit-req.conf'
337
[nginx-limit-req]
338
port    = http,https
339
logpath = %(nginx_error_log)s
340
 
37 - 341
[nginx-botsearch]
6 - 342
 
37 - 343
port     = http,https
344
logpath  = %(nginx_error_log)s
6 - 345
maxretry = 2
346
 
75 - 347
 
37 - 348
# Ban attackers that try to use PHP's URL-fopen() functionality
349
# through GET/POST variables. - Experimental, with more than a year
350
# of usage in production environments.
6 - 351
 
37 - 352
[php-url-fopen]
6 - 353
 
37 - 354
port    = http,https
355
logpath = %(nginx_access_log)s
356
          %(apache_access_log)s
6 - 357
 
358
 
37 - 359
[suhosin]
6 - 360
 
37 - 361
port    = http,https
362
logpath = %(suhosin_log)s
6 - 363
 
364
 
37 - 365
[lighttpd-auth]
366
# Same as above for Apache's mod_auth
367
# It catches wrong authentifications
368
port    = http,https
369
logpath = %(lighttpd_error_log)s
3 - 370
 
371
 
37 - 372
#
373
# Webmail and groupware servers
374
#
6 - 375
 
37 - 376
[roundcube-auth]
6 - 377
 
37 - 378
port     = http,https
75 - 379
logpath  = %(roundcube_errors_log)s
6 - 380
 
381
 
37 - 382
[openwebmail]
6 - 383
 
37 - 384
port     = http,https
385
logpath  = /var/log/openwebmail.log
6 - 386
 
387
 
37 - 388
[horde]
6 - 389
 
37 - 390
port     = http,https
391
logpath  = /var/log/horde/horde.log
6 - 392
 
393
 
37 - 394
[groupoffice]
6 - 395
 
37 - 396
port     = http,https
397
logpath  = /home/groupoffice/log/info.log
6 - 398
 
399
 
37 - 400
[sogo-auth]
401
# Monitor SOGo groupware server
402
# without proxy this would be:
403
# port    = 20000
404
port     = http,https
405
logpath  = /var/log/sogo/sogo.log
6 - 406
 
407
 
37 - 408
[tine20]
6 - 409
 
37 - 410
logpath  = /var/log/tine20/tine20.log
411
port     = http,https
3 - 412
 
6 - 413
 
37 - 414
#
415
# Web Applications
416
#
417
#
3 - 418
 
37 - 419
[drupal-auth]
3 - 420
 
37 - 421
port     = http,https
422
logpath  = %(syslog_daemon)s
75 - 423
backend  = %(syslog_backend)s
6 - 424
 
37 - 425
[guacamole]
3 - 426
 
37 - 427
port     = http,https
428
logpath  = /var/log/tomcat*/catalina.out
3 - 429
 
37 - 430
[monit]
431
#Ban clients brute-forcing the monit gui login
432
port = 2812
433
logpath  = /var/log/monit
6 - 434
 
3 - 435
 
37 - 436
[webmin-auth]
3 - 437
 
37 - 438
port    = 10000
439
logpath = %(syslog_authpriv)s
75 - 440
backend = %(syslog_backend)s
6 - 441
 
3 - 442
 
44 - 443
[froxlor-auth]
444
 
445
port    = http,https
446
logpath  = %(syslog_authpriv)s
75 - 447
backend  = %(syslog_backend)s
44 - 448
 
449
 
37 - 450
#
451
# HTTP Proxy servers
452
#
453
#
3 - 454
 
37 - 455
[squid]
3 - 456
 
37 - 457
port     =  80,443,3128,8080
458
logpath = /var/log/squid/access.log
3 - 459
 
460
 
37 - 461
[3proxy]
6 - 462
 
37 - 463
port    = 3128
464
logpath = /var/log/3proxy.log
6 - 465
 
44 - 466
 
37 - 467
#
468
# FTP servers
469
#
6 - 470
 
471
 
37 - 472
[proftpd]
6 - 473
 
37 - 474
port     = ftp,ftp-data,ftps,ftps-data
475
logpath  = %(proftpd_log)s
75 - 476
backend  = %(proftpd_backend)s
6 - 477
 
478
 
37 - 479
[pure-ftpd]
6 - 480
 
37 - 481
port     = ftp,ftp-data,ftps,ftps-data
482
logpath  = %(pureftpd_log)s
75 - 483
backend  = %(pureftpd_backend)s
6 - 484
 
485
 
37 - 486
[gssftpd]
3 - 487
 
37 - 488
port     = ftp,ftp-data,ftps,ftps-data
489
logpath  = %(syslog_daemon)s
75 - 490
backend  = %(syslog_backend)s
3 - 491
 
492
 
37 - 493
[wuftpd]
3 - 494
 
37 - 495
port     = ftp,ftp-data,ftps,ftps-data
496
logpath  = %(wuftpd_log)s
75 - 497
backend  = %(wuftpd_backend)s
3 - 498
 
499
 
37 - 500
[vsftpd]
501
# or overwrite it in jails.local to be
502
# logpath = %(syslog_authpriv)s
503
# if you want to rely on PAM failed login attempts
504
# vsftpd's failregex should match both of those formats
505
port     = ftp,ftp-data,ftps,ftps-data
506
logpath  = %(vsftpd_log)s
3 - 507
 
508
 
37 - 509
#
510
# Mail servers
511
#
6 - 512
 
37 - 513
# ASSP SMTP Proxy Jail
514
[assp]
3 - 515
 
37 - 516
port     = smtp,465,submission
517
logpath  = /root/path/to/assp/logs/maillog.txt
3 - 518
 
519
 
37 - 520
[courier-smtp]
3 - 521
 
37 - 522
port     = smtp,465,submission
523
logpath  = %(syslog_mail)s
75 - 524
backend  = %(syslog_backend)s
3 - 525
 
526
 
37 - 527
[postfix]
6 - 528
 
37 - 529
port     = smtp,465,submission
530
logpath  = %(postfix_log)s
75 - 531
backend  = %(postfix_backend)s
6 - 532
 
533
 
37 - 534
[postfix-rbl]
6 - 535
 
37 - 536
port     = smtp,465,submission
75 - 537
logpath  = %(postfix_log)s
538
backend  = %(postfix_backend)s
37 - 539
maxretry = 1
6 - 540
 
541
 
37 - 542
[sendmail-auth]
6 - 543
 
37 - 544
port    = submission,465,smtp
545
logpath = %(syslog_mail)s
75 - 546
backend = %(syslog_backend)s
6 - 547
 
548
 
37 - 549
[sendmail-reject]
6 - 550
 
37 - 551
port     = smtp,465,submission
552
logpath  = %(syslog_mail)s
75 - 553
backend  = %(syslog_backend)s
6 - 554
 
3 - 555
 
37 - 556
[qmail-rbl]
3 - 557
 
37 - 558
filter  = qmail
559
port    = smtp,465,submission
560
logpath = /service/qmail/log/main/current
6 - 561
 
3 - 562
 
37 - 563
# dovecot defaults to logging to the mail syslog facility
564
# but can be set by syslog_facility in the dovecot configuration.
565
[dovecot]
3 - 566
 
37 - 567
port    = pop3,pop3s,imap,imaps,submission,465,sieve
568
logpath = %(dovecot_log)s
75 - 569
backend = %(dovecot_backend)s
6 - 570
 
3 - 571
 
37 - 572
[sieve]
3 - 573
 
37 - 574
port   = smtp,465,submission
575
logpath = %(dovecot_log)s
75 - 576
backend = %(dovecot_backend)s
3 - 577
 
6 - 578
 
37 - 579
[solid-pop3d]
6 - 580
 
37 - 581
port    = pop3,pop3s
582
logpath = %(solidpop3d_log)s
6 - 583
 
3 - 584
 
37 - 585
[exim]
3 - 586
 
37 - 587
port   = smtp,465,submission
588
logpath = %(exim_main_log)s
6 - 589
 
3 - 590
 
37 - 591
[exim-spam]
3 - 592
 
37 - 593
port   = smtp,465,submission
594
logpath = %(exim_main_log)s
3 - 595
 
596
 
37 - 597
[kerio]
3 - 598
 
37 - 599
port    = imap,smtp,imaps,465
600
logpath = /opt/kerio/mailserver/store/logs/security.log
3 - 601
 
602
 
37 - 603
#
604
# Mail servers authenticators: might be used for smtp,ftp,imap servers, so
605
# all relevant ports get banned
606
#
3 - 607
 
37 - 608
[courier-auth]
3 - 609
 
37 - 610
port     = smtp,465,submission,imap3,imaps,pop3,pop3s
611
logpath  = %(syslog_mail)s
75 - 612
backend  = %(syslog_backend)s
3 - 613
 
614
 
37 - 615
[postfix-sasl]
3 - 616
 
37 - 617
port     = smtp,465,submission,imap3,imaps,pop3,pop3s
618
# You might consider monitoring /var/log/mail.warn instead if you are
619
# running postfix since it would provide the same log lines at the
620
# "warn" level but overall at the smaller filesize.
621
logpath  = %(postfix_log)s
75 - 622
backend  = %(postfix_backend)s
37 - 623
 
624
 
3 - 625
[perdition]
626
 
37 - 627
port   = imap3,imaps,pop3,pop3s
628
logpath = %(syslog_mail)s
75 - 629
backend = %(syslog_backend)s
3 - 630
 
631
 
37 - 632
[squirrelmail]
633
 
634
port = smtp,465,submission,imap2,imap3,imaps,pop3,pop3s,http,https,socks
635
logpath = /var/lib/squirrelmail/prefs/squirrelmail_access_log
636
 
637
 
638
[cyrus-imap]
639
 
640
port   = imap3,imaps
641
logpath = %(syslog_mail)s
75 - 642
backend = %(syslog_backend)s
37 - 643
 
644
 
3 - 645
[uwimap-auth]
646
 
37 - 647
port   = imap3,imaps
648
logpath = %(syslog_mail)s
75 - 649
backend = %(syslog_backend)s
3 - 650
 
651
 
37 - 652
#
653
#
654
# DNS servers
655
#
3 - 656
 
657
 
37 - 658
# !!! WARNING !!!
659
#   Since UDP is connection-less protocol, spoofing of IP and imitation
660
#   of illegal actions is way too simple.  Thus enabling of this filter
661
#   might provide an easy way for implementing a DoS against a chosen
662
#   victim. See
663
#    http://nion.modprobe.de/blog/archives/690-fail2ban-+-dns-fail.html
664
#   Please DO NOT USE this jail unless you know what you are doing.
665
#
666
# IMPORTANT: see filter.d/named-refused for instructions to enable logging
667
# This jail blocks UDP traffic for DNS requests.
668
# [named-refused-udp]
669
#
670
# filter   = named-refused
671
# port     = domain,953
672
# protocol = udp
673
# logpath  = /var/log/named/security.log
3 - 674
 
37 - 675
# IMPORTANT: see filter.d/named-refused for instructions to enable logging
676
# This jail blocks TCP traffic for DNS requests.
3 - 677
 
37 - 678
[named-refused]
3 - 679
 
37 - 680
port     = domain,953
681
logpath  = /var/log/named/security.log
3 - 682
 
683
 
37 - 684
[nsd]
3 - 685
 
37 - 686
port     = 53
687
action   = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
688
           %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
689
logpath = /var/log/nsd.log
3 - 690
 
691
 
37 - 692
#
693
# Miscellaneous
694
#
3 - 695
 
37 - 696
[asterisk]
3 - 697
 
37 - 698
port     = 5060,5061
699
action   = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
700
           %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
701
           %(mta)s-whois[name=%(__name__)s, dest="%(destemail)s"]
702
logpath  = /var/log/asterisk/messages
703
maxretry = 10
3 - 704
 
705
 
37 - 706
[freeswitch]
3 - 707
 
37 - 708
port     = 5060,5061
709
action   = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
710
           %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
711
           %(mta)s-whois[name=%(__name__)s, dest="%(destemail)s"]
712
logpath  = /var/log/freeswitch.log
713
maxretry = 10
3 - 714
 
715
 
37 - 716
# To log wrong MySQL access attempts add to /etc/my.cnf in [mysqld] or
717
# equivalent section:
718
# log-warning = 2
719
#
720
# for syslog (daemon facility)
721
# [mysqld_safe]
722
# syslog
723
#
724
# for own logfile
725
# [mysqld]
726
# log-error=/var/log/mysqld.log
727
[mysqld-auth]
3 - 728
 
37 - 729
port     = 3306
730
logpath  = %(mysql_log)s
75 - 731
backend  = %(mysql_backend)s
6 - 732
 
733
 
86 - 734
# Log wrong MongoDB auth (for details see filter 'filter.d/mongodb-auth.conf')
735
[mongodb-auth]
736
# change port when running with "--shardsvr" or "--configsvr" runtime operation
737
port     = 27017
738
logpath  = /var/log/mongodb/mongodb.log
739
 
740
 
37 - 741
# Jail for more extended banning of persistent abusers
742
# !!! WARNINGS !!!
743
# 1. Make sure that your loglevel specified in fail2ban.conf/.local
744
#    is not at DEBUG level -- which might then cause fail2ban to fall into
745
#    an infinite loop constantly feeding itself with non-informative lines
746
# 2. Increase dbpurgeage defined in fail2ban.conf to e.g. 648000 (7.5 days)
747
#    to maintain entries for failed logins for sufficient amount of time
748
[recidive]
6 - 749
 
37 - 750
logpath  = /var/log/messages
75 - 751
banaction = %(banaction_allports)s
37 - 752
bantime  = 604800  ; 1 week
753
findtime = 86400   ; 1 day
6 - 754
 
755
 
37 - 756
# Generic filter for PAM. Has to be used with action which bans all
757
# ports such as iptables-allports, shorewall
6 - 758
 
37 - 759
[pam-generic]
760
# pam-generic filter can be customized to monitor specific subset of 'tty's
75 - 761
banaction = %(banaction_allports)s
37 - 762
logpath  = %(syslog_authpriv)s
75 - 763
backend  = %(syslog_backend)s
6 - 764
 
37 - 765
 
766
[xinetd-fail]
767
 
768
banaction = iptables-multiport-log
769
logpath   = %(syslog_daemon)s
75 - 770
backend   = %(syslog_backend)s
37 - 771
maxretry  = 2
772
 
773
 
774
# stunnel - need to set port for this
775
[stunnel]
776
 
777
logpath = /var/log/stunnel4/stunnel.log
778
 
779
 
780
[ejabberd-auth]
781
 
782
port    = 5222
783
logpath = /var/log/ejabberd/ejabberd.log
784
 
785
 
786
[counter-strike]
787
 
788
logpath = /opt/cstrike/logs/L[0-9]*.log
789
# Firewall: http://www.cstrike-planet.com/faq/6
790
tcpport = 27030,27031,27032,27033,27034,27035,27036,27037,27038,27039
791
udpport = 1200,27000,27001,27002,27003,27004,27005,27006,27007,27008,27009,27010,27011,27012,27013,27014,27015
792
action  = %(banaction)s[name=%(__name__)s-tcp, port="%(tcpport)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
793
           %(banaction)s[name=%(__name__)s-udp, port="%(udpport)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
794
 
6 - 795
# consider low maxretry and a long bantime
796
# nobody except your own Nagios server should ever probe nrpe
797
[nagios]
37 - 798
 
799
logpath  = %(syslog_daemon)s     ; nrpe.cfg may define a different log_facility
75 - 800
backend  = %(syslog_backend)s
6 - 801
maxretry = 1
37 - 802
 
803
 
804
[oracleims]
805
# see "oracleims" filter file for configuration requirement for Oracle IMS v6 and above
806
logpath = /opt/sun/comms/messaging64/log/mail.log_current
75 - 807
banaction = %(banaction_allports)s
37 - 808
 
809
[directadmin]
810
logpath = /var/log/directadmin/login.log
811
port = 2222
812
 
813
[portsentry]
814
logpath  = /var/lib/portsentry/portsentry.history
815
maxretry = 1
44 - 816
 
817
[pass2allow-ftp]
818
# this pass2allow example allows FTP traffic after successful HTTP authentication
819
port         = ftp,ftp-data,ftps,ftps-data
86 - 820
# knocking_url variable must be overridden to some secret value in jail.local
821
knocking_url = /knocking/
822
filter       = apache-pass[knocking_url="%(knocking_url)s"]
44 - 823
# access log of the website with HTTP auth
824
logpath      = %(apache_access_log)s
825
blocktype    = RETURN
826
returntype   = DROP
827
bantime      = 3600
828
maxretry     = 1
829
findtime     = 1
75 - 830
 
831
 
832
[murmur]
833
# AKA mumble-server
834
port     = 64738
835
action   = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol=tcp, chain="%(chain)s", actname=%(banaction)s-tcp]
836
           %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol=udp, chain="%(chain)s", actname=%(banaction)s-udp]
837
logpath  = /var/log/mumble-server/mumble-server.log
838
 
839
 
840
[screensharingd]
841
# For Mac OS Screen Sharing Service (VNC)
842
logpath  = /var/log/system.log
843
logencoding = utf-8
844
 
845
[haproxy-http-auth]
846
# HAProxy by default doesn't log to file you'll need to set it up to forward
847
# logs to a syslog server which would then write them to disk.
848
# See "haproxy-http-auth" filter for a brief cautionary note when setting
849
# maxretry and findtime.
850
logpath  = /var/log/haproxy.log
86 - 851
 
852
[slapd]
853
port    = ldap,ldaps
854
filter  = slapd
855
logpath = /var/log/slapd.log