Subversion Repositories configs

Rev

Rev 37 | Rev 75 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
3 - 1
#
37 - 2
# WARNING: heavily refactored in 0.9.0 release.  Please review and
3
#          customize settings for your setup.
4
#
5
# Changes:  in most of the cases you should not modify this
6
#           file, but provide customizations in jail.local file,
7
#           or separate .conf files under jail.d/ directory, e.g.:
8
#
6 - 9
# HOW TO ACTIVATE JAILS:
3 - 10
#
6 - 11
# YOU SHOULD NOT MODIFY THIS FILE.
3 - 12
#
37 - 13
# It will probably be overwritten or improved in a distribution update.
6 - 14
#
15
# Provide customizations in a jail.local file or a jail.d/customisation.local.
16
# For example to change the default bantime for all jails and to enable the
17
# ssh-iptables jail the following (uncommented) would appear in the .local file.
18
# See man 5 jail.conf for details.
19
#
3 - 20
# [DEFAULT]
21
# bantime = 3600
22
#
37 - 23
# [sshd]
3 - 24
# enabled = true
37 - 25
#
26
# See jail.conf(5) man page for more information
3 - 27
 
6 - 28
 
29
 
30
# Comments: use '#' for comment lines and ';' (following a space) for inline comments
31
 
37 - 32
 
33
[INCLUDES]
34
 
35
#before = paths-distro.conf
36
before = paths-fedora.conf
37
 
3 - 38
# The DEFAULT allows a global definition of the options. They can be overridden
39
# in each jail afterwards.
40
 
41
[DEFAULT]
42
 
37 - 43
#
44
# MISCELLANEOUS OPTIONS
45
#
46
 
3 - 47
# "ignoreip" can be an IP address, a CIDR mask or a DNS host. Fail2ban will not
48
# ban a host which matches an address in this list. Several addresses can be
49
# defined using space separator.
50
ignoreip = 127.0.0.1/8
51
 
6 - 52
# External command that will take an tagged arguments to ignore, e.g. <ip>,
53
# and return true if the IP is to be ignored. False otherwise.
54
#
55
# ignorecommand = /path/to/command <ip>
56
ignorecommand =
57
 
3 - 58
# "bantime" is the number of seconds that a host is banned.
59
bantime  = 600
60
 
61
# A host is banned if it has generated "maxretry" during the last "findtime"
62
# seconds.
63
findtime  = 600
64
 
65
# "maxretry" is the number of failures before a host get banned.
37 - 66
maxretry = 5
3 - 67
 
68
# "backend" specifies the backend used to get files modification.
37 - 69
# Available options are "pyinotify", "gamin", "polling", "systemd" and "auto".
3 - 70
# This option can be overridden in each jail as well.
71
#
72
# pyinotify: requires pyinotify (a file alteration monitor) to be installed.
73
#              If pyinotify is not installed, Fail2ban will use auto.
74
# gamin:     requires Gamin (a file alteration monitor) to be installed.
75
#              If Gamin is not installed, Fail2ban will use auto.
76
# polling:   uses a polling algorithm which does not require external libraries.
37 - 77
# systemd:   uses systemd python library to access the systemd journal.
78
#              Specifying "logpath" is not valid for this backend.
79
#              See "journalmatch" in the jails associated filter config
3 - 80
# auto:      will try to use the following backends, in order:
81
#              pyinotify, gamin, polling.
37 - 82
#
83
# Note: if systemd backend is choses as the default but you enable a jail
84
#       for which logs are present only in its own log files, specify some other
85
#       backend for that jail (e.g. polling) and provide empty value for
86
#       journalmatch. See https://github.com/fail2ban/fail2ban/issues/959#issuecomment-74901200
3 - 87
backend = auto
88
 
89
# "usedns" specifies if jails should trust hostnames in logs,
90
#   warn when DNS lookups are performed, or ignore all hostnames in logs
91
#
92
# yes:   if a hostname is encountered, a DNS lookup will be performed.
93
# warn:  if a hostname is encountered, a DNS lookup will be performed,
94
#        but it will be logged as a warning.
95
# no:    if a hostname is encountered, will not be used for banning,
96
#        but it will be logged as info.
97
usedns = warn
98
 
37 - 99
# "logencoding" specifies the encoding of the log files handled by the jail
100
#   This is used to decode the lines from the log file.
101
#   Typical examples:  "ascii", "utf-8"
102
#
103
#   auto:   will use the system locale setting
104
logencoding = auto
3 - 105
 
37 - 106
# "enabled" enables the jails.
107
#  By default all jails are disabled, and it should stay this way.
108
#  Enable only relevant to your setup jails in your .local or jail.d/*.conf
109
#
110
# true:  jail will be enabled and log files will get monitored for changes
111
# false: jail is not enabled
112
enabled = false
3 - 113
 
6 - 114
 
37 - 115
# "filter" defines the filter to use by the jail.
116
#  By default jails have names matching their filter name
117
#
118
filter = %(__name__)s
6 - 119
 
120
 
37 - 121
#
122
# ACTIONS
123
#
6 - 124
 
37 - 125
# Some options used for actions
6 - 126
 
37 - 127
# Destination email address used solely for the interpolations in
128
# jail.{conf,local,d/*} configuration files.
129
destemail = root@localhost
6 - 130
 
37 - 131
# Sender email address used solely for some actions
132
sender = root@localhost
3 - 133
 
37 - 134
# E-mail action. Since 0.8.1 Fail2Ban uses sendmail MTA for the
135
# mailing. Change mta configuration parameter to mail if you want to
136
# revert to conventional 'mail'.
137
mta = sendmail
3 - 138
 
37 - 139
# Default protocol
140
protocol = tcp
6 - 141
 
37 - 142
# Specify chain where jumps would need to be added in iptables-* actions
143
chain = INPUT
6 - 144
 
37 - 145
# Ports to be banned
146
# Usually should be overridden in a particular jail
147
port = 0:65535
6 - 148
 
37 - 149
#
150
# Action shortcuts. To be used to define action parameter
6 - 151
 
37 - 152
# Default banning action (e.g. iptables, iptables-new,
153
# iptables-multiport, shorewall, etc) It is used to define
154
# action_* variables. Can be overridden globally or per
155
# section within jail.local file
156
banaction = iptables-multiport
6 - 157
 
37 - 158
# The simplest action to take: ban only
159
action_ = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
6 - 160
 
37 - 161
# ban & send an e-mail with whois report to the destemail.
162
action_mw = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
163
            %(mta)s-whois[name=%(__name__)s, dest="%(destemail)s", protocol="%(protocol)s", chain="%(chain)s"]
6 - 164
 
37 - 165
# ban & send an e-mail with whois report and relevant log lines
166
# to the destemail.
167
action_mwl = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
168
             %(mta)s-whois-lines[name=%(__name__)s, dest="%(destemail)s", logpath=%(logpath)s, chain="%(chain)s"]
3 - 169
 
37 - 170
# See the IMPORTANT note in action.d/xarf-login-attack for when to use this action
171
#
172
# ban & send a xarf e-mail to abuse contact of IP address and include relevant log lines
173
# to the destemail.
174
action_xarf = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
175
             xarf-login-attack[service=%(__name__)s, sender="%(sender)s", logpath=%(logpath)s, port="%(port)s"]
3 - 176
 
44 - 177
# ban IP on CloudFlare & send an e-mail with whois report and relevant log lines
178
# to the destemail.
179
action_cf_mwl = cloudflare[cfuser="%(cfemail)s", cftoken="%(cfapikey)s"]
180
                %(mta)s-whois-lines[name=%(__name__)s, dest="%(destemail)s", logpath=%(logpath)s, chain="%(chain)s"]
6 - 181
 
37 - 182
# Report block via blocklist.de fail2ban reporting service API
183
#
184
# See the IMPORTANT note in action.d/blocklist_de.conf for when to
185
# use this action. Create a file jail.d/blocklist_de.local containing
186
# [Init]
187
# blocklist_de_apikey = {api key from registration]
188
#
189
action_blocklist_de  = blocklist_de[email="%(sender)s", service=%(filter)s, apikey="%(blocklist_de_apikey)s"]
6 - 190
 
37 - 191
# Report ban via badips.com, and use as blacklist
192
#
193
# See BadIPsAction docstring in config/action.d/badips.py for
194
# documentation for this action.
195
#
196
# NOTE: This action relies on banaction being present on start and therefore
197
# should be last action defined for a jail.
198
#
199
action_badips = badips.py[category="%(name)s", banaction="%(banaction)s"]
6 - 200
 
37 - 201
# Choose default action.  To change, just override value of 'action' with the
202
# interpolation to the chosen action shortcut (e.g.  action_mw, action_mwl, etc) in jail.local
203
# globally (section [DEFAULT]) or per specific section
204
action = %(action_)s
6 - 205
 
206
 
37 - 207
#
208
# JAILS
209
#
6 - 210
 
37 - 211
#
212
# SSH servers
213
#
6 - 214
 
37 - 215
[sshd]
216
enabled = true
6 - 217
 
37 - 218
port    = ssh
219
logpath = %(sshd_log)s
6 - 220
 
221
 
37 - 222
[sshd-ddos]
223
# This jail corresponds to the standard configuration in Fail2ban.
224
# The mail-whois action send a notification e-mail with a whois request
225
# in the body.
226
port    = ssh
227
logpath = %(sshd_log)s
6 - 228
 
229
 
37 - 230
[dropbear]
6 - 231
 
37 - 232
port     = ssh
233
logpath  = %(dropbear_log)s
6 - 234
 
235
 
37 - 236
[selinux-ssh]
6 - 237
 
37 - 238
port     = ssh
239
logpath  = %(auditd_log)s
240
maxretry = 5
3 - 241
 
242
 
37 - 243
#
244
# HTTP servers
245
#
6 - 246
 
37 - 247
[apache-auth]
3 - 248
 
37 - 249
port     = http,https
250
logpath  = %(apache_error_log)s
6 - 251
 
252
 
37 - 253
[apache-badbots]
254
# Ban hosts which agent identifies spammer robots crawling the web
255
# for email addresses. The mail outputs are buffered.
256
port     = http,https
257
logpath  = %(apache_access_log)s
258
bantime  = 172800
259
maxretry = 1
3 - 260
 
261
 
37 - 262
[apache-noscript]
6 - 263
 
37 - 264
port     = http,https
265
logpath  = %(apache_error_log)s
266
maxretry = 6
3 - 267
 
268
 
37 - 269
[apache-overflows]
6 - 270
 
37 - 271
port     = http,https
272
logpath  = %(apache_error_log)s
273
maxretry = 2
3 - 274
 
275
 
37 - 276
[apache-nohome]
6 - 277
 
37 - 278
port     = http,https
279
logpath  = %(apache_error_log)s
280
maxretry = 2
6 - 281
 
3 - 282
 
37 - 283
[apache-botsearch]
6 - 284
 
37 - 285
port     = http,https
286
logpath  = %(apache_error_log)s
287
maxretry = 2
6 - 288
 
3 - 289
 
37 - 290
[apache-fakegooglebot]
6 - 291
 
37 - 292
port     = http,https
293
logpath  = %(apache_access_log)s
294
maxretry = 1
295
ignorecommand = %(ignorecommands_dir)s/apache-fakegooglebot <ip>
3 - 296
 
297
 
6 - 298
[apache-modsecurity]
299
 
37 - 300
port     = http,https
301
logpath  = %(apache_error_log)s
6 - 302
maxretry = 2
303
 
37 - 304
[apache-shellshock]
6 - 305
 
37 - 306
port    = http,https
307
logpath = %(apache_error_log)s
308
maxretry = 1
6 - 309
 
37 - 310
[nginx-http-auth]
6 - 311
 
37 - 312
port    = http,https
313
logpath = %(nginx_error_log)s
6 - 314
 
37 - 315
[nginx-botsearch]
6 - 316
 
37 - 317
port     = http,https
318
logpath  = %(nginx_error_log)s
6 - 319
maxretry = 2
320
 
37 - 321
# Ban attackers that try to use PHP's URL-fopen() functionality
322
# through GET/POST variables. - Experimental, with more than a year
323
# of usage in production environments.
6 - 324
 
37 - 325
[php-url-fopen]
6 - 326
 
37 - 327
port    = http,https
328
logpath = %(nginx_access_log)s
329
          %(apache_access_log)s
6 - 330
 
331
 
37 - 332
[suhosin]
6 - 333
 
37 - 334
port    = http,https
335
logpath = %(suhosin_log)s
6 - 336
 
337
 
37 - 338
[lighttpd-auth]
339
# Same as above for Apache's mod_auth
340
# It catches wrong authentifications
341
port    = http,https
342
logpath = %(lighttpd_error_log)s
3 - 343
 
344
 
37 - 345
#
346
# Webmail and groupware servers
347
#
6 - 348
 
37 - 349
[roundcube-auth]
6 - 350
 
37 - 351
port     = http,https
44 - 352
logpath  = logpath = %(roundcube_errors_log)s
6 - 353
 
354
 
37 - 355
[openwebmail]
6 - 356
 
37 - 357
port     = http,https
358
logpath  = /var/log/openwebmail.log
6 - 359
 
360
 
37 - 361
[horde]
6 - 362
 
37 - 363
port     = http,https
364
logpath  = /var/log/horde/horde.log
6 - 365
 
366
 
37 - 367
[groupoffice]
6 - 368
 
37 - 369
port     = http,https
370
logpath  = /home/groupoffice/log/info.log
6 - 371
 
372
 
37 - 373
[sogo-auth]
374
# Monitor SOGo groupware server
375
# without proxy this would be:
376
# port    = 20000
377
port     = http,https
378
logpath  = /var/log/sogo/sogo.log
6 - 379
 
380
 
37 - 381
[tine20]
6 - 382
 
37 - 383
logpath  = /var/log/tine20/tine20.log
384
port     = http,https
3 - 385
maxretry = 5
386
 
6 - 387
 
37 - 388
#
389
# Web Applications
390
#
391
#
3 - 392
 
37 - 393
[drupal-auth]
3 - 394
 
37 - 395
port     = http,https
396
logpath  = %(syslog_daemon)s
6 - 397
 
37 - 398
[guacamole]
3 - 399
 
37 - 400
port     = http,https
401
logpath  = /var/log/tomcat*/catalina.out
3 - 402
 
37 - 403
[monit]
404
#Ban clients brute-forcing the monit gui login
405
filter   = monit
406
port = 2812
407
logpath  = /var/log/monit
6 - 408
 
3 - 409
 
37 - 410
[webmin-auth]
3 - 411
 
37 - 412
port    = 10000
413
logpath = %(syslog_authpriv)s
6 - 414
 
3 - 415
 
44 - 416
[froxlor-auth]
417
 
418
port    = http,https
419
logpath  = %(syslog_authpriv)s
420
 
421
 
37 - 422
#
423
# HTTP Proxy servers
424
#
425
#
3 - 426
 
37 - 427
[squid]
3 - 428
 
37 - 429
port     =  80,443,3128,8080
430
logpath = /var/log/squid/access.log
3 - 431
 
432
 
37 - 433
[3proxy]
6 - 434
 
37 - 435
port    = 3128
436
logpath = /var/log/3proxy.log
6 - 437
 
44 - 438
 
37 - 439
#
440
# FTP servers
441
#
6 - 442
 
443
 
37 - 444
[proftpd]
6 - 445
 
37 - 446
port     = ftp,ftp-data,ftps,ftps-data
447
logpath  = %(proftpd_log)s
6 - 448
 
449
 
37 - 450
[pure-ftpd]
6 - 451
 
37 - 452
port     = ftp,ftp-data,ftps,ftps-data
453
logpath  = %(pureftpd_log)s
454
maxretry = 6
6 - 455
 
456
 
37 - 457
[gssftpd]
3 - 458
 
37 - 459
port     = ftp,ftp-data,ftps,ftps-data
460
logpath  = %(syslog_daemon)s
461
maxretry = 6
3 - 462
 
463
 
37 - 464
[wuftpd]
3 - 465
 
37 - 466
port     = ftp,ftp-data,ftps,ftps-data
467
logpath  = %(wuftpd_log)s
468
maxretry = 6
3 - 469
 
470
 
37 - 471
[vsftpd]
472
# or overwrite it in jails.local to be
473
# logpath = %(syslog_authpriv)s
474
# if you want to rely on PAM failed login attempts
475
# vsftpd's failregex should match both of those formats
476
port     = ftp,ftp-data,ftps,ftps-data
477
logpath  = %(vsftpd_log)s
3 - 478
 
479
 
37 - 480
#
481
# Mail servers
482
#
6 - 483
 
37 - 484
# ASSP SMTP Proxy Jail
485
[assp]
3 - 486
 
37 - 487
port     = smtp,465,submission
488
logpath  = /root/path/to/assp/logs/maillog.txt
3 - 489
 
490
 
37 - 491
[courier-smtp]
3 - 492
 
37 - 493
port     = smtp,465,submission
494
logpath  = %(syslog_mail)s
3 - 495
 
496
 
37 - 497
[postfix]
6 - 498
 
37 - 499
port     = smtp,465,submission
500
logpath  = %(postfix_log)s
6 - 501
 
502
 
37 - 503
[postfix-rbl]
6 - 504
 
37 - 505
port     = smtp,465,submission
506
logpath  = %(syslog_mail)s
507
maxretry = 1
6 - 508
 
509
 
37 - 510
[sendmail-auth]
6 - 511
 
37 - 512
port    = submission,465,smtp
513
logpath = %(syslog_mail)s
6 - 514
 
515
 
37 - 516
[sendmail-reject]
6 - 517
 
37 - 518
port     = smtp,465,submission
519
logpath  = %(syslog_mail)s
6 - 520
 
3 - 521
 
37 - 522
[qmail-rbl]
3 - 523
 
37 - 524
filter  = qmail
525
port    = smtp,465,submission
526
logpath = /service/qmail/log/main/current
6 - 527
 
3 - 528
 
37 - 529
# dovecot defaults to logging to the mail syslog facility
530
# but can be set by syslog_facility in the dovecot configuration.
531
[dovecot]
3 - 532
 
37 - 533
port    = pop3,pop3s,imap,imaps,submission,465,sieve
534
logpath = %(dovecot_log)s
6 - 535
 
3 - 536
 
37 - 537
[sieve]
3 - 538
 
37 - 539
port   = smtp,465,submission
540
logpath = %(dovecot_log)s
3 - 541
 
6 - 542
 
37 - 543
[solid-pop3d]
6 - 544
 
37 - 545
port    = pop3,pop3s
546
logpath = %(solidpop3d_log)s
6 - 547
 
3 - 548
 
37 - 549
[exim]
3 - 550
 
37 - 551
port   = smtp,465,submission
552
logpath = %(exim_main_log)s
6 - 553
 
3 - 554
 
37 - 555
[exim-spam]
3 - 556
 
37 - 557
port   = smtp,465,submission
558
logpath = %(exim_main_log)s
3 - 559
 
560
 
37 - 561
[kerio]
3 - 562
 
37 - 563
port    = imap,smtp,imaps,465
564
logpath = /opt/kerio/mailserver/store/logs/security.log
3 - 565
 
566
 
37 - 567
#
568
# Mail servers authenticators: might be used for smtp,ftp,imap servers, so
569
# all relevant ports get banned
570
#
3 - 571
 
37 - 572
[courier-auth]
3 - 573
 
37 - 574
port     = smtp,465,submission,imap3,imaps,pop3,pop3s
575
logpath  = %(syslog_mail)s
3 - 576
 
577
 
37 - 578
[postfix-sasl]
3 - 579
 
37 - 580
port     = smtp,465,submission,imap3,imaps,pop3,pop3s
581
# You might consider monitoring /var/log/mail.warn instead if you are
582
# running postfix since it would provide the same log lines at the
583
# "warn" level but overall at the smaller filesize.
584
logpath  = %(postfix_log)s
585
 
586
 
3 - 587
[perdition]
588
 
37 - 589
port   = imap3,imaps,pop3,pop3s
590
logpath = %(syslog_mail)s
3 - 591
 
592
 
37 - 593
[squirrelmail]
594
 
595
port = smtp,465,submission,imap2,imap3,imaps,pop3,pop3s,http,https,socks
596
logpath = /var/lib/squirrelmail/prefs/squirrelmail_access_log
597
 
598
 
599
[cyrus-imap]
600
 
601
port   = imap3,imaps
602
logpath = %(syslog_mail)s
603
 
604
 
3 - 605
[uwimap-auth]
606
 
37 - 607
port   = imap3,imaps
608
logpath = %(syslog_mail)s
3 - 609
 
610
 
37 - 611
#
612
#
613
# DNS servers
614
#
3 - 615
 
616
 
37 - 617
# !!! WARNING !!!
618
#   Since UDP is connection-less protocol, spoofing of IP and imitation
619
#   of illegal actions is way too simple.  Thus enabling of this filter
620
#   might provide an easy way for implementing a DoS against a chosen
621
#   victim. See
622
#    http://nion.modprobe.de/blog/archives/690-fail2ban-+-dns-fail.html
623
#   Please DO NOT USE this jail unless you know what you are doing.
624
#
625
# IMPORTANT: see filter.d/named-refused for instructions to enable logging
626
# This jail blocks UDP traffic for DNS requests.
627
# [named-refused-udp]
628
#
629
# filter   = named-refused
630
# port     = domain,953
631
# protocol = udp
632
# logpath  = /var/log/named/security.log
3 - 633
 
37 - 634
# IMPORTANT: see filter.d/named-refused for instructions to enable logging
635
# This jail blocks TCP traffic for DNS requests.
3 - 636
 
37 - 637
[named-refused]
3 - 638
 
37 - 639
port     = domain,953
640
logpath  = /var/log/named/security.log
3 - 641
 
642
 
37 - 643
[nsd]
3 - 644
 
37 - 645
port     = 53
646
action   = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
647
           %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
648
logpath = /var/log/nsd.log
3 - 649
 
650
 
37 - 651
#
652
# Miscellaneous
653
#
3 - 654
 
37 - 655
[asterisk]
3 - 656
 
37 - 657
port     = 5060,5061
658
action   = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
659
           %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
660
           %(mta)s-whois[name=%(__name__)s, dest="%(destemail)s"]
661
logpath  = /var/log/asterisk/messages
662
maxretry = 10
3 - 663
 
664
 
37 - 665
[freeswitch]
3 - 666
 
37 - 667
port     = 5060,5061
668
action   = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
669
           %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
670
           %(mta)s-whois[name=%(__name__)s, dest="%(destemail)s"]
671
logpath  = /var/log/freeswitch.log
672
maxretry = 10
3 - 673
 
674
 
37 - 675
# To log wrong MySQL access attempts add to /etc/my.cnf in [mysqld] or
676
# equivalent section:
677
# log-warning = 2
678
#
679
# for syslog (daemon facility)
680
# [mysqld_safe]
681
# syslog
682
#
683
# for own logfile
684
# [mysqld]
685
# log-error=/var/log/mysqld.log
686
[mysqld-auth]
3 - 687
 
37 - 688
port     = 3306
689
logpath  = %(mysql_log)s
690
maxretry = 5
6 - 691
 
692
 
37 - 693
# Jail for more extended banning of persistent abusers
694
# !!! WARNINGS !!!
695
# 1. Make sure that your loglevel specified in fail2ban.conf/.local
696
#    is not at DEBUG level -- which might then cause fail2ban to fall into
697
#    an infinite loop constantly feeding itself with non-informative lines
698
# 2. Increase dbpurgeage defined in fail2ban.conf to e.g. 648000 (7.5 days)
699
#    to maintain entries for failed logins for sufficient amount of time
700
[recidive]
6 - 701
 
37 - 702
logpath  = /var/log/messages
703
banaction = iptables-allports
704
bantime  = 604800  ; 1 week
705
findtime = 86400   ; 1 day
3 - 706
maxretry = 5
6 - 707
 
708
 
37 - 709
# Generic filter for PAM. Has to be used with action which bans all
710
# ports such as iptables-allports, shorewall
6 - 711
 
37 - 712
[pam-generic]
713
# pam-generic filter can be customized to monitor specific subset of 'tty's
714
banaction = iptables-allports
715
logpath  = %(syslog_authpriv)s
6 - 716
 
37 - 717
 
718
[xinetd-fail]
719
 
720
banaction = iptables-multiport-log
721
logpath   = %(syslog_daemon)s
722
maxretry  = 2
723
 
724
 
725
# stunnel - need to set port for this
726
[stunnel]
727
 
728
logpath = /var/log/stunnel4/stunnel.log
729
 
730
 
731
[ejabberd-auth]
732
 
733
port    = 5222
734
logpath = /var/log/ejabberd/ejabberd.log
735
 
736
 
737
[counter-strike]
738
 
739
logpath = /opt/cstrike/logs/L[0-9]*.log
740
# Firewall: http://www.cstrike-planet.com/faq/6
741
tcpport = 27030,27031,27032,27033,27034,27035,27036,27037,27038,27039
742
udpport = 1200,27000,27001,27002,27003,27004,27005,27006,27007,27008,27009,27010,27011,27012,27013,27014,27015
743
action  = %(banaction)s[name=%(__name__)s-tcp, port="%(tcpport)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
744
           %(banaction)s[name=%(__name__)s-udp, port="%(udpport)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
745
 
6 - 746
# consider low maxretry and a long bantime
747
# nobody except your own Nagios server should ever probe nrpe
748
[nagios]
37 - 749
 
6 - 750
enabled  = false
37 - 751
logpath  = %(syslog_daemon)s     ; nrpe.cfg may define a different log_facility
6 - 752
maxretry = 1
37 - 753
 
754
 
755
[oracleims]
756
# see "oracleims" filter file for configuration requirement for Oracle IMS v6 and above
757
enabled = false
758
logpath = /opt/sun/comms/messaging64/log/mail.log_current
759
maxretry = 6
760
banaction = iptables-allports
761
 
762
[directadmin]
763
enabled = false
764
logpath = /var/log/directadmin/login.log
765
port = 2222
766
 
767
[portsentry]
768
enabled  = false
769
logpath  = /var/lib/portsentry/portsentry.history
770
maxretry = 1
44 - 771
 
772
[pass2allow-ftp]
773
# this pass2allow example allows FTP traffic after successful HTTP authentication
774
port         = ftp,ftp-data,ftps,ftps-data
775
# knocking_url variable must be overridden to some secret value in filter.d/apache-pass.local
776
filter       = apache-pass
777
# access log of the website with HTTP auth
778
logpath      = %(apache_access_log)s
779
blocktype    = RETURN
780
returntype   = DROP
781
bantime      = 3600
782
maxretry     = 1
783
findtime     = 1