Subversion Repositories configs

Rev

Rev 6 | Rev 44 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
3 - 1
#
37 - 2
# WARNING: heavily refactored in 0.9.0 release.  Please review and
3
#          customize settings for your setup.
4
#
5
# Changes:  in most of the cases you should not modify this
6
#           file, but provide customizations in jail.local file,
7
#           or separate .conf files under jail.d/ directory, e.g.:
8
#
6 - 9
# HOW TO ACTIVATE JAILS:
3 - 10
#
6 - 11
# YOU SHOULD NOT MODIFY THIS FILE.
3 - 12
#
37 - 13
# It will probably be overwritten or improved in a distribution update.
6 - 14
#
15
# Provide customizations in a jail.local file or a jail.d/customisation.local.
16
# For example to change the default bantime for all jails and to enable the
17
# ssh-iptables jail the following (uncommented) would appear in the .local file.
18
# See man 5 jail.conf for details.
19
#
3 - 20
# [DEFAULT]
21
# bantime = 3600
22
#
37 - 23
# [sshd]
3 - 24
# enabled = true
37 - 25
#
26
# See jail.conf(5) man page for more information
3 - 27
 
6 - 28
 
29
 
30
# Comments: use '#' for comment lines and ';' (following a space) for inline comments
31
 
37 - 32
 
33
[INCLUDES]
34
 
35
#before = paths-distro.conf
36
before = paths-fedora.conf
37
 
3 - 38
# The DEFAULT allows a global definition of the options. They can be overridden
39
# in each jail afterwards.
40
 
41
[DEFAULT]
42
 
37 - 43
#
44
# MISCELLANEOUS OPTIONS
45
#
46
 
3 - 47
# "ignoreip" can be an IP address, a CIDR mask or a DNS host. Fail2ban will not
48
# ban a host which matches an address in this list. Several addresses can be
49
# defined using space separator.
50
ignoreip = 127.0.0.1/8
51
 
6 - 52
# External command that will take an tagged arguments to ignore, e.g. <ip>,
53
# and return true if the IP is to be ignored. False otherwise.
54
#
55
# ignorecommand = /path/to/command <ip>
56
ignorecommand =
57
 
3 - 58
# "bantime" is the number of seconds that a host is banned.
59
bantime  = 600
60
 
61
# A host is banned if it has generated "maxretry" during the last "findtime"
62
# seconds.
63
findtime  = 600
64
 
65
# "maxretry" is the number of failures before a host get banned.
37 - 66
maxretry = 5
3 - 67
 
68
# "backend" specifies the backend used to get files modification.
37 - 69
# Available options are "pyinotify", "gamin", "polling", "systemd" and "auto".
3 - 70
# This option can be overridden in each jail as well.
71
#
72
# pyinotify: requires pyinotify (a file alteration monitor) to be installed.
73
#              If pyinotify is not installed, Fail2ban will use auto.
74
# gamin:     requires Gamin (a file alteration monitor) to be installed.
75
#              If Gamin is not installed, Fail2ban will use auto.
76
# polling:   uses a polling algorithm which does not require external libraries.
37 - 77
# systemd:   uses systemd python library to access the systemd journal.
78
#              Specifying "logpath" is not valid for this backend.
79
#              See "journalmatch" in the jails associated filter config
3 - 80
# auto:      will try to use the following backends, in order:
81
#              pyinotify, gamin, polling.
37 - 82
#
83
# Note: if systemd backend is choses as the default but you enable a jail
84
#       for which logs are present only in its own log files, specify some other
85
#       backend for that jail (e.g. polling) and provide empty value for
86
#       journalmatch. See https://github.com/fail2ban/fail2ban/issues/959#issuecomment-74901200
3 - 87
backend = auto
88
 
89
# "usedns" specifies if jails should trust hostnames in logs,
90
#   warn when DNS lookups are performed, or ignore all hostnames in logs
91
#
92
# yes:   if a hostname is encountered, a DNS lookup will be performed.
93
# warn:  if a hostname is encountered, a DNS lookup will be performed,
94
#        but it will be logged as a warning.
95
# no:    if a hostname is encountered, will not be used for banning,
96
#        but it will be logged as info.
97
usedns = warn
98
 
37 - 99
# "logencoding" specifies the encoding of the log files handled by the jail
100
#   This is used to decode the lines from the log file.
101
#   Typical examples:  "ascii", "utf-8"
102
#
103
#   auto:   will use the system locale setting
104
logencoding = auto
3 - 105
 
37 - 106
# "enabled" enables the jails.
107
#  By default all jails are disabled, and it should stay this way.
108
#  Enable only relevant to your setup jails in your .local or jail.d/*.conf
109
#
110
# true:  jail will be enabled and log files will get monitored for changes
111
# false: jail is not enabled
112
enabled = false
3 - 113
 
6 - 114
 
37 - 115
# "filter" defines the filter to use by the jail.
116
#  By default jails have names matching their filter name
117
#
118
filter = %(__name__)s
6 - 119
 
120
 
37 - 121
#
122
# ACTIONS
123
#
6 - 124
 
37 - 125
# Some options used for actions
6 - 126
 
37 - 127
# Destination email address used solely for the interpolations in
128
# jail.{conf,local,d/*} configuration files.
129
destemail = root@localhost
6 - 130
 
37 - 131
# Sender email address used solely for some actions
132
sender = root@localhost
3 - 133
 
37 - 134
# E-mail action. Since 0.8.1 Fail2Ban uses sendmail MTA for the
135
# mailing. Change mta configuration parameter to mail if you want to
136
# revert to conventional 'mail'.
137
mta = sendmail
3 - 138
 
37 - 139
# Default protocol
140
protocol = tcp
6 - 141
 
37 - 142
# Specify chain where jumps would need to be added in iptables-* actions
143
chain = INPUT
6 - 144
 
37 - 145
# Ports to be banned
146
# Usually should be overridden in a particular jail
147
port = 0:65535
6 - 148
 
37 - 149
#
150
# Action shortcuts. To be used to define action parameter
6 - 151
 
37 - 152
# Default banning action (e.g. iptables, iptables-new,
153
# iptables-multiport, shorewall, etc) It is used to define
154
# action_* variables. Can be overridden globally or per
155
# section within jail.local file
156
banaction = iptables-multiport
6 - 157
 
37 - 158
# The simplest action to take: ban only
159
action_ = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
6 - 160
 
37 - 161
# ban & send an e-mail with whois report to the destemail.
162
action_mw = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
163
            %(mta)s-whois[name=%(__name__)s, dest="%(destemail)s", protocol="%(protocol)s", chain="%(chain)s"]
6 - 164
 
37 - 165
# ban & send an e-mail with whois report and relevant log lines
166
# to the destemail.
167
action_mwl = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
168
             %(mta)s-whois-lines[name=%(__name__)s, dest="%(destemail)s", logpath=%(logpath)s, chain="%(chain)s"]
3 - 169
 
37 - 170
# See the IMPORTANT note in action.d/xarf-login-attack for when to use this action
171
#
172
# ban & send a xarf e-mail to abuse contact of IP address and include relevant log lines
173
# to the destemail.
174
action_xarf = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
175
             xarf-login-attack[service=%(__name__)s, sender="%(sender)s", logpath=%(logpath)s, port="%(port)s"]
3 - 176
 
6 - 177
 
37 - 178
# Report block via blocklist.de fail2ban reporting service API
179
#
180
# See the IMPORTANT note in action.d/blocklist_de.conf for when to
181
# use this action. Create a file jail.d/blocklist_de.local containing
182
# [Init]
183
# blocklist_de_apikey = {api key from registration]
184
#
185
action_blocklist_de  = blocklist_de[email="%(sender)s", service=%(filter)s, apikey="%(blocklist_de_apikey)s"]
6 - 186
 
37 - 187
# Report ban via badips.com, and use as blacklist
188
#
189
# See BadIPsAction docstring in config/action.d/badips.py for
190
# documentation for this action.
191
#
192
# NOTE: This action relies on banaction being present on start and therefore
193
# should be last action defined for a jail.
194
#
195
action_badips = badips.py[category="%(name)s", banaction="%(banaction)s"]
6 - 196
 
37 - 197
# Choose default action.  To change, just override value of 'action' with the
198
# interpolation to the chosen action shortcut (e.g.  action_mw, action_mwl, etc) in jail.local
199
# globally (section [DEFAULT]) or per specific section
200
action = %(action_)s
6 - 201
 
202
 
37 - 203
#
204
# JAILS
205
#
6 - 206
 
37 - 207
#
208
# SSH servers
209
#
6 - 210
 
37 - 211
[sshd]
212
enabled = true
6 - 213
 
37 - 214
port    = ssh
215
logpath = %(sshd_log)s
6 - 216
 
217
 
37 - 218
[sshd-ddos]
219
# This jail corresponds to the standard configuration in Fail2ban.
220
# The mail-whois action send a notification e-mail with a whois request
221
# in the body.
222
port    = ssh
223
logpath = %(sshd_log)s
6 - 224
 
225
 
37 - 226
[dropbear]
6 - 227
 
37 - 228
port     = ssh
229
logpath  = %(dropbear_log)s
6 - 230
 
231
 
37 - 232
[selinux-ssh]
6 - 233
 
37 - 234
port     = ssh
235
logpath  = %(auditd_log)s
236
maxretry = 5
3 - 237
 
238
 
37 - 239
#
240
# HTTP servers
241
#
6 - 242
 
37 - 243
[apache-auth]
3 - 244
 
37 - 245
port     = http,https
246
logpath  = %(apache_error_log)s
6 - 247
 
248
 
37 - 249
[apache-badbots]
250
# Ban hosts which agent identifies spammer robots crawling the web
251
# for email addresses. The mail outputs are buffered.
252
port     = http,https
253
logpath  = %(apache_access_log)s
254
bantime  = 172800
255
maxretry = 1
3 - 256
 
257
 
37 - 258
[apache-noscript]
6 - 259
 
37 - 260
port     = http,https
261
logpath  = %(apache_error_log)s
262
maxretry = 6
3 - 263
 
264
 
37 - 265
[apache-overflows]
6 - 266
 
37 - 267
port     = http,https
268
logpath  = %(apache_error_log)s
269
maxretry = 2
3 - 270
 
271
 
37 - 272
[apache-nohome]
6 - 273
 
37 - 274
port     = http,https
275
logpath  = %(apache_error_log)s
276
maxretry = 2
6 - 277
 
3 - 278
 
37 - 279
[apache-botsearch]
6 - 280
 
37 - 281
port     = http,https
282
logpath  = %(apache_error_log)s
283
maxretry = 2
6 - 284
 
3 - 285
 
37 - 286
[apache-fakegooglebot]
6 - 287
 
37 - 288
port     = http,https
289
logpath  = %(apache_access_log)s
290
maxretry = 1
291
ignorecommand = %(ignorecommands_dir)s/apache-fakegooglebot <ip>
3 - 292
 
293
 
6 - 294
[apache-modsecurity]
295
 
37 - 296
port     = http,https
297
logpath  = %(apache_error_log)s
6 - 298
maxretry = 2
299
 
37 - 300
[apache-shellshock]
6 - 301
 
37 - 302
port    = http,https
303
logpath = %(apache_error_log)s
304
maxretry = 1
6 - 305
 
37 - 306
[nginx-http-auth]
6 - 307
 
37 - 308
port    = http,https
309
logpath = %(nginx_error_log)s
6 - 310
 
37 - 311
[nginx-botsearch]
6 - 312
 
37 - 313
port     = http,https
314
logpath  = %(nginx_error_log)s
6 - 315
maxretry = 2
316
 
37 - 317
# Ban attackers that try to use PHP's URL-fopen() functionality
318
# through GET/POST variables. - Experimental, with more than a year
319
# of usage in production environments.
6 - 320
 
37 - 321
[php-url-fopen]
6 - 322
 
37 - 323
port    = http,https
324
logpath = %(nginx_access_log)s
325
          %(apache_access_log)s
6 - 326
 
327
 
37 - 328
[suhosin]
6 - 329
 
37 - 330
port    = http,https
331
logpath = %(suhosin_log)s
6 - 332
 
333
 
37 - 334
[lighttpd-auth]
335
# Same as above for Apache's mod_auth
336
# It catches wrong authentifications
337
port    = http,https
338
logpath = %(lighttpd_error_log)s
3 - 339
 
340
 
37 - 341
#
342
# Webmail and groupware servers
343
#
6 - 344
 
37 - 345
[roundcube-auth]
6 - 346
 
37 - 347
port     = http,https
348
logpath  = /var/log/roundcube/userlogins
6 - 349
 
350
 
37 - 351
[openwebmail]
6 - 352
 
37 - 353
port     = http,https
354
logpath  = /var/log/openwebmail.log
6 - 355
 
356
 
37 - 357
[horde]
6 - 358
 
37 - 359
port     = http,https
360
logpath  = /var/log/horde/horde.log
6 - 361
 
362
 
37 - 363
[groupoffice]
6 - 364
 
37 - 365
port     = http,https
366
logpath  = /home/groupoffice/log/info.log
6 - 367
 
368
 
37 - 369
[sogo-auth]
370
# Monitor SOGo groupware server
371
# without proxy this would be:
372
# port    = 20000
373
port     = http,https
374
logpath  = /var/log/sogo/sogo.log
6 - 375
 
376
 
37 - 377
[tine20]
6 - 378
 
37 - 379
logpath  = /var/log/tine20/tine20.log
380
port     = http,https
3 - 381
maxretry = 5
382
 
6 - 383
 
37 - 384
#
385
# Web Applications
386
#
387
#
3 - 388
 
37 - 389
[drupal-auth]
3 - 390
 
37 - 391
port     = http,https
392
logpath  = %(syslog_daemon)s
6 - 393
 
37 - 394
[guacamole]
3 - 395
 
37 - 396
port     = http,https
397
logpath  = /var/log/tomcat*/catalina.out
3 - 398
 
37 - 399
[monit]
400
#Ban clients brute-forcing the monit gui login
401
filter   = monit
402
port = 2812
403
logpath  = /var/log/monit
6 - 404
 
3 - 405
 
37 - 406
[webmin-auth]
3 - 407
 
37 - 408
port    = 10000
409
logpath = %(syslog_authpriv)s
6 - 410
 
3 - 411
 
37 - 412
#
413
# HTTP Proxy servers
414
#
415
#
3 - 416
 
37 - 417
[squid]
3 - 418
 
37 - 419
port     =  80,443,3128,8080
420
logpath = /var/log/squid/access.log
3 - 421
 
422
 
37 - 423
[3proxy]
6 - 424
 
37 - 425
port    = 3128
426
logpath = /var/log/3proxy.log
6 - 427
 
37 - 428
#
429
# FTP servers
430
#
6 - 431
 
432
 
37 - 433
[proftpd]
6 - 434
 
37 - 435
port     = ftp,ftp-data,ftps,ftps-data
436
logpath  = %(proftpd_log)s
6 - 437
 
438
 
37 - 439
[pure-ftpd]
6 - 440
 
37 - 441
port     = ftp,ftp-data,ftps,ftps-data
442
logpath  = %(pureftpd_log)s
443
maxretry = 6
6 - 444
 
445
 
37 - 446
[gssftpd]
3 - 447
 
37 - 448
port     = ftp,ftp-data,ftps,ftps-data
449
logpath  = %(syslog_daemon)s
450
maxretry = 6
3 - 451
 
452
 
37 - 453
[wuftpd]
3 - 454
 
37 - 455
port     = ftp,ftp-data,ftps,ftps-data
456
logpath  = %(wuftpd_log)s
457
maxretry = 6
3 - 458
 
459
 
37 - 460
[vsftpd]
461
# or overwrite it in jails.local to be
462
# logpath = %(syslog_authpriv)s
463
# if you want to rely on PAM failed login attempts
464
# vsftpd's failregex should match both of those formats
465
port     = ftp,ftp-data,ftps,ftps-data
466
logpath  = %(vsftpd_log)s
3 - 467
 
468
 
37 - 469
#
470
# Mail servers
471
#
6 - 472
 
37 - 473
# ASSP SMTP Proxy Jail
474
[assp]
3 - 475
 
37 - 476
port     = smtp,465,submission
477
logpath  = /root/path/to/assp/logs/maillog.txt
3 - 478
 
479
 
37 - 480
[courier-smtp]
3 - 481
 
37 - 482
port     = smtp,465,submission
483
logpath  = %(syslog_mail)s
3 - 484
 
485
 
37 - 486
[postfix]
6 - 487
 
37 - 488
port     = smtp,465,submission
489
logpath  = %(postfix_log)s
6 - 490
 
491
 
37 - 492
[postfix-rbl]
6 - 493
 
37 - 494
port     = smtp,465,submission
495
logpath  = %(syslog_mail)s
496
maxretry = 1
6 - 497
 
498
 
37 - 499
[sendmail-auth]
6 - 500
 
37 - 501
port    = submission,465,smtp
502
logpath = %(syslog_mail)s
6 - 503
 
504
 
37 - 505
[sendmail-reject]
6 - 506
 
37 - 507
port     = smtp,465,submission
508
logpath  = %(syslog_mail)s
6 - 509
 
3 - 510
 
37 - 511
[qmail-rbl]
3 - 512
 
37 - 513
filter  = qmail
514
port    = smtp,465,submission
515
logpath = /service/qmail/log/main/current
6 - 516
 
3 - 517
 
37 - 518
# dovecot defaults to logging to the mail syslog facility
519
# but can be set by syslog_facility in the dovecot configuration.
520
[dovecot]
3 - 521
 
37 - 522
port    = pop3,pop3s,imap,imaps,submission,465,sieve
523
logpath = %(dovecot_log)s
6 - 524
 
3 - 525
 
37 - 526
[sieve]
3 - 527
 
37 - 528
port   = smtp,465,submission
529
logpath = %(dovecot_log)s
3 - 530
 
6 - 531
 
37 - 532
[solid-pop3d]
6 - 533
 
37 - 534
port    = pop3,pop3s
535
logpath = %(solidpop3d_log)s
6 - 536
 
3 - 537
 
37 - 538
[exim]
3 - 539
 
37 - 540
port   = smtp,465,submission
541
logpath = %(exim_main_log)s
6 - 542
 
3 - 543
 
37 - 544
[exim-spam]
3 - 545
 
37 - 546
port   = smtp,465,submission
547
logpath = %(exim_main_log)s
3 - 548
 
549
 
37 - 550
[kerio]
3 - 551
 
37 - 552
port    = imap,smtp,imaps,465
553
logpath = /opt/kerio/mailserver/store/logs/security.log
3 - 554
 
555
 
37 - 556
#
557
# Mail servers authenticators: might be used for smtp,ftp,imap servers, so
558
# all relevant ports get banned
559
#
3 - 560
 
37 - 561
[courier-auth]
3 - 562
 
37 - 563
port     = smtp,465,submission,imap3,imaps,pop3,pop3s
564
logpath  = %(syslog_mail)s
3 - 565
 
566
 
37 - 567
[postfix-sasl]
3 - 568
 
37 - 569
port     = smtp,465,submission,imap3,imaps,pop3,pop3s
570
# You might consider monitoring /var/log/mail.warn instead if you are
571
# running postfix since it would provide the same log lines at the
572
# "warn" level but overall at the smaller filesize.
573
logpath  = %(postfix_log)s
574
 
575
 
3 - 576
[perdition]
577
 
37 - 578
port   = imap3,imaps,pop3,pop3s
579
logpath = %(syslog_mail)s
3 - 580
 
581
 
37 - 582
[squirrelmail]
583
 
584
port = smtp,465,submission,imap2,imap3,imaps,pop3,pop3s,http,https,socks
585
logpath = /var/lib/squirrelmail/prefs/squirrelmail_access_log
586
 
587
 
588
[cyrus-imap]
589
 
590
port   = imap3,imaps
591
logpath = %(syslog_mail)s
592
 
593
 
3 - 594
[uwimap-auth]
595
 
37 - 596
port   = imap3,imaps
597
logpath = %(syslog_mail)s
3 - 598
 
599
 
37 - 600
#
601
#
602
# DNS servers
603
#
3 - 604
 
605
 
37 - 606
# !!! WARNING !!!
607
#   Since UDP is connection-less protocol, spoofing of IP and imitation
608
#   of illegal actions is way too simple.  Thus enabling of this filter
609
#   might provide an easy way for implementing a DoS against a chosen
610
#   victim. See
611
#    http://nion.modprobe.de/blog/archives/690-fail2ban-+-dns-fail.html
612
#   Please DO NOT USE this jail unless you know what you are doing.
613
#
614
# IMPORTANT: see filter.d/named-refused for instructions to enable logging
615
# This jail blocks UDP traffic for DNS requests.
616
# [named-refused-udp]
617
#
618
# filter   = named-refused
619
# port     = domain,953
620
# protocol = udp
621
# logpath  = /var/log/named/security.log
3 - 622
 
37 - 623
# IMPORTANT: see filter.d/named-refused for instructions to enable logging
624
# This jail blocks TCP traffic for DNS requests.
3 - 625
 
37 - 626
[named-refused]
3 - 627
 
37 - 628
port     = domain,953
629
logpath  = /var/log/named/security.log
3 - 630
 
631
 
37 - 632
[nsd]
3 - 633
 
37 - 634
port     = 53
635
action   = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
636
           %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
637
logpath = /var/log/nsd.log
3 - 638
 
639
 
37 - 640
#
641
# Miscellaneous
642
#
3 - 643
 
37 - 644
[asterisk]
3 - 645
 
37 - 646
port     = 5060,5061
647
action   = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
648
           %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
649
           %(mta)s-whois[name=%(__name__)s, dest="%(destemail)s"]
650
logpath  = /var/log/asterisk/messages
651
maxretry = 10
3 - 652
 
653
 
37 - 654
[freeswitch]
3 - 655
 
37 - 656
port     = 5060,5061
657
action   = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
658
           %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
659
           %(mta)s-whois[name=%(__name__)s, dest="%(destemail)s"]
660
logpath  = /var/log/freeswitch.log
661
maxretry = 10
3 - 662
 
663
 
37 - 664
# To log wrong MySQL access attempts add to /etc/my.cnf in [mysqld] or
665
# equivalent section:
666
# log-warning = 2
667
#
668
# for syslog (daemon facility)
669
# [mysqld_safe]
670
# syslog
671
#
672
# for own logfile
673
# [mysqld]
674
# log-error=/var/log/mysqld.log
675
[mysqld-auth]
3 - 676
 
37 - 677
port     = 3306
678
logpath  = %(mysql_log)s
679
maxretry = 5
6 - 680
 
681
 
37 - 682
# Jail for more extended banning of persistent abusers
683
# !!! WARNINGS !!!
684
# 1. Make sure that your loglevel specified in fail2ban.conf/.local
685
#    is not at DEBUG level -- which might then cause fail2ban to fall into
686
#    an infinite loop constantly feeding itself with non-informative lines
687
# 2. Increase dbpurgeage defined in fail2ban.conf to e.g. 648000 (7.5 days)
688
#    to maintain entries for failed logins for sufficient amount of time
689
[recidive]
6 - 690
 
37 - 691
logpath  = /var/log/messages
692
banaction = iptables-allports
693
bantime  = 604800  ; 1 week
694
findtime = 86400   ; 1 day
3 - 695
maxretry = 5
6 - 696
 
697
 
37 - 698
# Generic filter for PAM. Has to be used with action which bans all
699
# ports such as iptables-allports, shorewall
6 - 700
 
37 - 701
[pam-generic]
702
# pam-generic filter can be customized to monitor specific subset of 'tty's
703
banaction = iptables-allports
704
logpath  = %(syslog_authpriv)s
6 - 705
 
37 - 706
 
707
[xinetd-fail]
708
 
709
banaction = iptables-multiport-log
710
logpath   = %(syslog_daemon)s
711
maxretry  = 2
712
 
713
 
714
# stunnel - need to set port for this
715
[stunnel]
716
 
717
logpath = /var/log/stunnel4/stunnel.log
718
 
719
 
720
[ejabberd-auth]
721
 
722
port    = 5222
723
logpath = /var/log/ejabberd/ejabberd.log
724
 
725
 
726
[counter-strike]
727
 
728
logpath = /opt/cstrike/logs/L[0-9]*.log
729
# Firewall: http://www.cstrike-planet.com/faq/6
730
tcpport = 27030,27031,27032,27033,27034,27035,27036,27037,27038,27039
731
udpport = 1200,27000,27001,27002,27003,27004,27005,27006,27007,27008,27009,27010,27011,27012,27013,27014,27015
732
action  = %(banaction)s[name=%(__name__)s-tcp, port="%(tcpport)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
733
           %(banaction)s[name=%(__name__)s-udp, port="%(udpport)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
734
 
6 - 735
# consider low maxretry and a long bantime
736
# nobody except your own Nagios server should ever probe nrpe
737
[nagios]
37 - 738
 
6 - 739
enabled  = false
37 - 740
logpath  = %(syslog_daemon)s     ; nrpe.cfg may define a different log_facility
6 - 741
maxretry = 1
37 - 742
 
743
 
744
[oracleims]
745
# see "oracleims" filter file for configuration requirement for Oracle IMS v6 and above
746
enabled = false
747
logpath = /opt/sun/comms/messaging64/log/mail.log_current
748
maxretry = 6
749
banaction = iptables-allports
750
 
751
[directadmin]
752
enabled = false
753
logpath = /var/log/directadmin/login.log
754
port = 2222
755
 
756
[portsentry]
757
enabled  = false
758
logpath  = /var/lib/portsentry/portsentry.history
759
maxretry = 1