Subversion Repositories configs

Rev

Rev 71 | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
4 - 1
#
34 - 2
# WARNING: heavily refactored in 0.9.0 release.  Please review and
3
#          customize settings for your setup.
4
#
5
# Changes:  in most of the cases you should not modify this
6
#           file, but provide customizations in jail.local file,
7
#           or separate .conf files under jail.d/ directory, e.g.:
8
#
4 - 9
# HOW TO ACTIVATE JAILS:
10
#
11
# YOU SHOULD NOT MODIFY THIS FILE.
12
#
34 - 13
# It will probably be overwritten or improved in a distribution update.
4 - 14
#
15
# Provide customizations in a jail.local file or a jail.d/customisation.local.
16
# For example to change the default bantime for all jails and to enable the
17
# ssh-iptables jail the following (uncommented) would appear in the .local file.
18
# See man 5 jail.conf for details.
19
#
20
# [DEFAULT]
21
# bantime = 3600
22
#
34 - 23
# [sshd]
4 - 24
# enabled = true
34 - 25
#
26
# See jail.conf(5) man page for more information
4 - 27
 
28
 
29
 
30
# Comments: use '#' for comment lines and ';' (following a space) for inline comments
31
 
34 - 32
 
33
[INCLUDES]
34
 
35
#before = paths-distro.conf
36
before = paths-fedora.conf
37
 
4 - 38
# The DEFAULT allows a global definition of the options. They can be overridden
39
# in each jail afterwards.
40
 
41
[DEFAULT]
42
 
34 - 43
#
44
# MISCELLANEOUS OPTIONS
45
#
46
 
4 - 47
# "ignoreip" can be an IP address, a CIDR mask or a DNS host. Fail2ban will not
48
# ban a host which matches an address in this list. Several addresses can be
71 - 49
# defined using space (and/or comma) separator.
4 - 50
ignoreip = 127.0.0.1/8
51
 
5 - 52
# External command that will take an tagged arguments to ignore, e.g. <ip>,
53
# and return true if the IP is to be ignored. False otherwise.
54
#
55
# ignorecommand = /path/to/command <ip>
56
ignorecommand =
57
 
4 - 58
# "bantime" is the number of seconds that a host is banned.
59
bantime  = 600
60
 
61
# A host is banned if it has generated "maxretry" during the last "findtime"
62
# seconds.
63
findtime  = 600
64
 
65
# "maxretry" is the number of failures before a host get banned.
34 - 66
maxretry = 5
4 - 67
 
68
# "backend" specifies the backend used to get files modification.
34 - 69
# Available options are "pyinotify", "gamin", "polling", "systemd" and "auto".
4 - 70
# This option can be overridden in each jail as well.
71
#
72
# pyinotify: requires pyinotify (a file alteration monitor) to be installed.
73
#              If pyinotify is not installed, Fail2ban will use auto.
74
# gamin:     requires Gamin (a file alteration monitor) to be installed.
75
#              If Gamin is not installed, Fail2ban will use auto.
76
# polling:   uses a polling algorithm which does not require external libraries.
34 - 77
# systemd:   uses systemd python library to access the systemd journal.
78
#              Specifying "logpath" is not valid for this backend.
79
#              See "journalmatch" in the jails associated filter config
4 - 80
# auto:      will try to use the following backends, in order:
81
#              pyinotify, gamin, polling.
34 - 82
#
71 - 83
# Note: if systemd backend is chosen as the default but you enable a jail
34 - 84
#       for which logs are present only in its own log files, specify some other
85
#       backend for that jail (e.g. polling) and provide empty value for
86
#       journalmatch. See https://github.com/fail2ban/fail2ban/issues/959#issuecomment-74901200
4 - 87
backend = auto
88
 
89
# "usedns" specifies if jails should trust hostnames in logs,
90
#   warn when DNS lookups are performed, or ignore all hostnames in logs
91
#
92
# yes:   if a hostname is encountered, a DNS lookup will be performed.
93
# warn:  if a hostname is encountered, a DNS lookup will be performed,
94
#        but it will be logged as a warning.
95
# no:    if a hostname is encountered, will not be used for banning,
96
#        but it will be logged as info.
87 - 97
# raw:   use raw value (no hostname), allow use it for no-host filters/actions (example user)
4 - 98
usedns = warn
99
 
34 - 100
# "logencoding" specifies the encoding of the log files handled by the jail
101
#   This is used to decode the lines from the log file.
102
#   Typical examples:  "ascii", "utf-8"
103
#
104
#   auto:   will use the system locale setting
105
logencoding = auto
4 - 106
 
34 - 107
# "enabled" enables the jails.
108
#  By default all jails are disabled, and it should stay this way.
109
#  Enable only relevant to your setup jails in your .local or jail.d/*.conf
110
#
111
# true:  jail will be enabled and log files will get monitored for changes
112
# false: jail is not enabled
113
enabled = false
114
 
115
 
116
# "filter" defines the filter to use by the jail.
117
#  By default jails have names matching their filter name
118
#
119
filter = %(__name__)s
120
 
121
 
122
#
123
# ACTIONS
124
#
125
 
126
# Some options used for actions
127
 
128
# Destination email address used solely for the interpolations in
129
# jail.{conf,local,d/*} configuration files.
130
destemail = root@localhost
131
 
132
# Sender email address used solely for some actions
133
sender = root@localhost
134
 
135
# E-mail action. Since 0.8.1 Fail2Ban uses sendmail MTA for the
136
# mailing. Change mta configuration parameter to mail if you want to
137
# revert to conventional 'mail'.
138
mta = sendmail
139
 
140
# Default protocol
141
protocol = tcp
142
 
143
# Specify chain where jumps would need to be added in iptables-* actions
144
chain = INPUT
145
 
146
# Ports to be banned
147
# Usually should be overridden in a particular jail
148
port = 0:65535
149
 
71 - 150
# Format of user-agent https://tools.ietf.org/html/rfc7231#section-5.5.3
151
fail2ban_agent = Fail2Ban/%(fail2ban_version)s
152
 
34 - 153
#
154
# Action shortcuts. To be used to define action parameter
155
 
156
# Default banning action (e.g. iptables, iptables-new,
157
# iptables-multiport, shorewall, etc) It is used to define
158
# action_* variables. Can be overridden globally or per
159
# section within jail.local file
160
banaction = iptables-multiport
71 - 161
banaction_allports = iptables-allports
34 - 162
 
163
# The simplest action to take: ban only
164
action_ = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
165
 
166
# ban & send an e-mail with whois report to the destemail.
167
action_mw = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
71 - 168
            %(mta)s-whois[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", protocol="%(protocol)s", chain="%(chain)s"]
34 - 169
 
170
# ban & send an e-mail with whois report and relevant log lines
171
# to the destemail.
172
action_mwl = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
71 - 173
             %(mta)s-whois-lines[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", logpath=%(logpath)s, chain="%(chain)s"]
34 - 174
 
175
# See the IMPORTANT note in action.d/xarf-login-attack for when to use this action
176
#
177
# ban & send a xarf e-mail to abuse contact of IP address and include relevant log lines
178
# to the destemail.
179
action_xarf = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
180
             xarf-login-attack[service=%(__name__)s, sender="%(sender)s", logpath=%(logpath)s, port="%(port)s"]
181
 
39 - 182
# ban IP on CloudFlare & send an e-mail with whois report and relevant log lines
183
# to the destemail.
184
action_cf_mwl = cloudflare[cfuser="%(cfemail)s", cftoken="%(cfapikey)s"]
71 - 185
                %(mta)s-whois-lines[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", logpath=%(logpath)s, chain="%(chain)s"]
34 - 186
 
187
# Report block via blocklist.de fail2ban reporting service API
188
#
189
# See the IMPORTANT note in action.d/blocklist_de.conf for when to
190
# use this action. Create a file jail.d/blocklist_de.local containing
191
# [Init]
192
# blocklist_de_apikey = {api key from registration]
193
#
71 - 194
action_blocklist_de  = blocklist_de[email="%(sender)s", service=%(filter)s, apikey="%(blocklist_de_apikey)s", agent="%(fail2ban_agent)s"]
34 - 195
 
196
# Report ban via badips.com, and use as blacklist
197
#
198
# See BadIPsAction docstring in config/action.d/badips.py for
199
# documentation for this action.
200
#
201
# NOTE: This action relies on banaction being present on start and therefore
202
# should be last action defined for a jail.
203
#
71 - 204
action_badips = badips.py[category="%(__name__)s", banaction="%(banaction)s", agent="%(fail2ban_agent)s"]
205
#
206
# Report ban via badips.com (uses action.d/badips.conf for reporting only)
207
#
208
action_badips_report = badips[category="%(__name__)s", agent="%(fail2ban_agent)s"]
34 - 209
 
210
# Choose default action.  To change, just override value of 'action' with the
211
# interpolation to the chosen action shortcut (e.g.  action_mw, action_mwl, etc) in jail.local
212
# globally (section [DEFAULT]) or per specific section
213
action = %(action_)s
214
 
215
 
216
#
217
# JAILS
218
#
219
 
220
#
221
# SSH servers
222
#
223
 
224
[sshd]
225
 
226
port    = ssh
227
logpath = %(sshd_log)s
71 - 228
backend = %(sshd_backend)s
34 - 229
 
230
 
231
[sshd-ddos]
4 - 232
# This jail corresponds to the standard configuration in Fail2ban.
233
# The mail-whois action send a notification e-mail with a whois request
234
# in the body.
34 - 235
port    = ssh
236
logpath = %(sshd_log)s
71 - 237
backend = %(sshd_backend)s
4 - 238
 
5 - 239
 
34 - 240
[dropbear]
5 - 241
 
34 - 242
port     = ssh
243
logpath  = %(dropbear_log)s
71 - 244
backend  = %(dropbear_backend)s
5 - 245
 
246
 
34 - 247
[selinux-ssh]
5 - 248
 
34 - 249
port     = ssh
250
logpath  = %(auditd_log)s
5 - 251
 
4 - 252
 
34 - 253
#
254
# HTTP servers
255
#
4 - 256
 
34 - 257
[apache-auth]
5 - 258
 
34 - 259
port     = http,https
260
logpath  = %(apache_error_log)s
5 - 261
 
34 - 262
 
263
[apache-badbots]
264
# Ban hosts which agent identifies spammer robots crawling the web
265
# for email addresses. The mail outputs are buffered.
266
port     = http,https
267
logpath  = %(apache_access_log)s
268
bantime  = 172800
269
maxretry = 1
270
 
271
 
272
[apache-noscript]
273
 
274
port     = http,https
275
logpath  = %(apache_error_log)s
276
 
277
 
278
[apache-overflows]
279
 
280
port     = http,https
281
logpath  = %(apache_error_log)s
5 - 282
maxretry = 2
283
 
284
 
34 - 285
[apache-nohome]
5 - 286
 
34 - 287
port     = http,https
288
logpath  = %(apache_error_log)s
289
maxretry = 2
5 - 290
 
291
 
34 - 292
[apache-botsearch]
4 - 293
 
34 - 294
port     = http,https
295
logpath  = %(apache_error_log)s
296
maxretry = 2
4 - 297
 
298
 
34 - 299
[apache-fakegooglebot]
5 - 300
 
34 - 301
port     = http,https
302
logpath  = %(apache_access_log)s
303
maxretry = 1
304
ignorecommand = %(ignorecommands_dir)s/apache-fakegooglebot <ip>
5 - 305
 
306
 
34 - 307
[apache-modsecurity]
5 - 308
 
34 - 309
port     = http,https
310
logpath  = %(apache_error_log)s
311
maxretry = 2
5 - 312
 
71 - 313
 
34 - 314
[apache-shellshock]
5 - 315
 
34 - 316
port    = http,https
317
logpath = %(apache_error_log)s
318
maxretry = 1
5 - 319
 
71 - 320
 
321
[openhab-auth]
322
 
323
filter = openhab
324
action = iptables-allports[name=NoAuthFailures]
325
logpath = /opt/openhab/logs/request.log
326
 
327
 
34 - 328
[nginx-http-auth]
5 - 329
 
34 - 330
port    = http,https
331
logpath = %(nginx_error_log)s
5 - 332
 
71 - 333
# To use 'nginx-limit-req' jail you should have `ngx_http_limit_req_module`
334
# and define `limit_req` and `limit_req_zone` as described in nginx documentation
335
# http://nginx.org/en/docs/http/ngx_http_limit_req_module.html
336
# or for example see in 'config/filter.d/nginx-limit-req.conf'
337
[nginx-limit-req]
338
port    = http,https
339
logpath = %(nginx_error_log)s
340
 
34 - 341
[nginx-botsearch]
5 - 342
 
34 - 343
port     = http,https
344
logpath  = %(nginx_error_log)s
345
maxretry = 2
5 - 346
 
71 - 347
 
34 - 348
# Ban attackers that try to use PHP's URL-fopen() functionality
349
# through GET/POST variables. - Experimental, with more than a year
350
# of usage in production environments.
5 - 351
 
34 - 352
[php-url-fopen]
5 - 353
 
34 - 354
port    = http,https
355
logpath = %(nginx_access_log)s
356
          %(apache_access_log)s
5 - 357
 
358
 
34 - 359
[suhosin]
4 - 360
 
34 - 361
port    = http,https
362
logpath = %(suhosin_log)s
4 - 363
 
364
 
34 - 365
[lighttpd-auth]
366
# Same as above for Apache's mod_auth
367
# It catches wrong authentifications
368
port    = http,https
369
logpath = %(lighttpd_error_log)s
4 - 370
 
371
 
34 - 372
#
373
# Webmail and groupware servers
374
#
4 - 375
 
34 - 376
[roundcube-auth]
4 - 377
 
34 - 378
port     = http,https
71 - 379
logpath  = %(roundcube_errors_log)s
4 - 380
 
381
 
34 - 382
[openwebmail]
4 - 383
 
34 - 384
port     = http,https
385
logpath  = /var/log/openwebmail.log
386
 
387
 
388
[horde]
389
 
390
port     = http,https
391
logpath  = /var/log/horde/horde.log
392
 
393
 
394
[groupoffice]
395
 
396
port     = http,https
397
logpath  = /home/groupoffice/log/info.log
398
 
399
 
400
[sogo-auth]
401
# Monitor SOGo groupware server
402
# without proxy this would be:
403
# port    = 20000
404
port     = http,https
405
logpath  = /var/log/sogo/sogo.log
406
 
407
 
408
[tine20]
409
 
410
logpath  = /var/log/tine20/tine20.log
411
port     = http,https
4 - 412
 
413
 
414
#
34 - 415
# Web Applications
416
#
417
#
4 - 418
 
34 - 419
[drupal-auth]
4 - 420
 
34 - 421
port     = http,https
422
logpath  = %(syslog_daemon)s
71 - 423
backend  = %(syslog_backend)s
4 - 424
 
34 - 425
[guacamole]
4 - 426
 
34 - 427
port     = http,https
428
logpath  = /var/log/tomcat*/catalina.out
4 - 429
 
34 - 430
[monit]
431
#Ban clients brute-forcing the monit gui login
432
port = 2812
433
logpath  = /var/log/monit
4 - 434
 
34 - 435
 
436
[webmin-auth]
437
 
438
port    = 10000
439
logpath = %(syslog_authpriv)s
71 - 440
backend = %(syslog_backend)s
34 - 441
 
442
 
39 - 443
[froxlor-auth]
444
 
445
port    = http,https
446
logpath  = %(syslog_authpriv)s
71 - 447
backend  = %(syslog_backend)s
39 - 448
 
449
 
4 - 450
#
34 - 451
# HTTP Proxy servers
452
#
453
#
4 - 454
 
34 - 455
[squid]
4 - 456
 
34 - 457
port     =  80,443,3128,8080
458
logpath = /var/log/squid/access.log
4 - 459
 
460
 
34 - 461
[3proxy]
462
 
463
port    = 3128
464
logpath = /var/log/3proxy.log
465
 
39 - 466
 
34 - 467
#
468
# FTP servers
469
#
470
 
471
 
472
[proftpd]
473
 
474
port     = ftp,ftp-data,ftps,ftps-data
475
logpath  = %(proftpd_log)s
71 - 476
backend  = %(proftpd_backend)s
34 - 477
 
478
 
479
[pure-ftpd]
480
 
481
port     = ftp,ftp-data,ftps,ftps-data
482
logpath  = %(pureftpd_log)s
71 - 483
backend  = %(pureftpd_backend)s
4 - 484
 
485
 
34 - 486
[gssftpd]
5 - 487
 
34 - 488
port     = ftp,ftp-data,ftps,ftps-data
489
logpath  = %(syslog_daemon)s
71 - 490
backend  = %(syslog_backend)s
5 - 491
 
492
 
34 - 493
[wuftpd]
5 - 494
 
34 - 495
port     = ftp,ftp-data,ftps,ftps-data
496
logpath  = %(wuftpd_log)s
71 - 497
backend  = %(wuftpd_backend)s
5 - 498
 
499
 
34 - 500
[vsftpd]
501
# or overwrite it in jails.local to be
502
# logpath = %(syslog_authpriv)s
503
# if you want to rely on PAM failed login attempts
504
# vsftpd's failregex should match both of those formats
505
port     = ftp,ftp-data,ftps,ftps-data
506
logpath  = %(vsftpd_log)s
5 - 507
 
508
 
34 - 509
#
510
# Mail servers
511
#
5 - 512
 
34 - 513
# ASSP SMTP Proxy Jail
514
[assp]
4 - 515
 
34 - 516
port     = smtp,465,submission
517
logpath  = /root/path/to/assp/logs/maillog.txt
4 - 518
 
519
 
34 - 520
[courier-smtp]
5 - 521
 
34 - 522
port     = smtp,465,submission
523
logpath  = %(syslog_mail)s
71 - 524
backend  = %(syslog_backend)s
5 - 525
 
526
 
34 - 527
[postfix]
4 - 528
 
34 - 529
port     = smtp,465,submission
530
logpath  = %(postfix_log)s
71 - 531
backend  = %(postfix_backend)s
4 - 532
 
533
 
34 - 534
[postfix-rbl]
5 - 535
 
34 - 536
port     = smtp,465,submission
71 - 537
logpath  = %(postfix_log)s
538
backend  = %(postfix_backend)s
34 - 539
maxretry = 1
5 - 540
 
541
 
34 - 542
[sendmail-auth]
5 - 543
 
34 - 544
port    = submission,465,smtp
545
logpath = %(syslog_mail)s
71 - 546
backend = %(syslog_backend)s
5 - 547
 
548
 
34 - 549
[sendmail-reject]
5 - 550
 
34 - 551
port     = smtp,465,submission
552
logpath  = %(syslog_mail)s
71 - 553
backend  = %(syslog_backend)s
5 - 554
 
555
 
556
[qmail-rbl]
557
 
558
filter  = qmail
34 - 559
port    = smtp,465,submission
5 - 560
logpath = /service/qmail/log/main/current
561
 
562
 
34 - 563
# dovecot defaults to logging to the mail syslog facility
564
# but can be set by syslog_facility in the dovecot configuration.
565
[dovecot]
5 - 566
 
34 - 567
port    = pop3,pop3s,imap,imaps,submission,465,sieve
568
logpath = %(dovecot_log)s
71 - 569
backend = %(dovecot_backend)s
5 - 570
 
571
 
34 - 572
[sieve]
4 - 573
 
34 - 574
port   = smtp,465,submission
575
logpath = %(dovecot_log)s
71 - 576
backend = %(dovecot_backend)s
4 - 577
 
578
 
34 - 579
[solid-pop3d]
4 - 580
 
34 - 581
port    = pop3,pop3s
582
logpath = %(solidpop3d_log)s
4 - 583
 
584
 
34 - 585
[exim]
4 - 586
 
34 - 587
port   = smtp,465,submission
588
logpath = %(exim_main_log)s
4 - 589
 
590
 
34 - 591
[exim-spam]
4 - 592
 
34 - 593
port   = smtp,465,submission
594
logpath = %(exim_main_log)s
4 - 595
 
596
 
34 - 597
[kerio]
4 - 598
 
34 - 599
port    = imap,smtp,imaps,465
600
logpath = /opt/kerio/mailserver/store/logs/security.log
4 - 601
 
602
 
34 - 603
#
604
# Mail servers authenticators: might be used for smtp,ftp,imap servers, so
605
# all relevant ports get banned
606
#
4 - 607
 
34 - 608
[courier-auth]
4 - 609
 
34 - 610
port     = smtp,465,submission,imap3,imaps,pop3,pop3s
611
logpath  = %(syslog_mail)s
71 - 612
backend  = %(syslog_backend)s
4 - 613
 
5 - 614
 
34 - 615
[postfix-sasl]
5 - 616
 
34 - 617
port     = smtp,465,submission,imap3,imaps,pop3,pop3s
618
# You might consider monitoring /var/log/mail.warn instead if you are
619
# running postfix since it would provide the same log lines at the
620
# "warn" level but overall at the smaller filesize.
621
logpath  = %(postfix_log)s
71 - 622
backend  = %(postfix_backend)s
5 - 623
 
624
 
34 - 625
[perdition]
5 - 626
 
34 - 627
port   = imap3,imaps,pop3,pop3s
628
logpath = %(syslog_mail)s
71 - 629
backend = %(syslog_backend)s
5 - 630
 
631
 
34 - 632
[squirrelmail]
5 - 633
 
34 - 634
port = smtp,465,submission,imap2,imap3,imaps,pop3,pop3s,http,https,socks
635
logpath = /var/lib/squirrelmail/prefs/squirrelmail_access_log
5 - 636
 
4 - 637
 
34 - 638
[cyrus-imap]
4 - 639
 
34 - 640
port   = imap3,imaps
641
logpath = %(syslog_mail)s
71 - 642
backend = %(syslog_backend)s
4 - 643
 
644
 
34 - 645
[uwimap-auth]
4 - 646
 
34 - 647
port   = imap3,imaps
648
logpath = %(syslog_mail)s
71 - 649
backend = %(syslog_backend)s
4 - 650
 
651
 
34 - 652
#
653
#
654
# DNS servers
655
#
4 - 656
 
657
 
658
# !!! WARNING !!!
659
#   Since UDP is connection-less protocol, spoofing of IP and imitation
660
#   of illegal actions is way too simple.  Thus enabling of this filter
661
#   might provide an easy way for implementing a DoS against a chosen
662
#   victim. See
663
#    http://nion.modprobe.de/blog/archives/690-fail2ban-+-dns-fail.html
664
#   Please DO NOT USE this jail unless you know what you are doing.
665
#
666
# IMPORTANT: see filter.d/named-refused for instructions to enable logging
667
# This jail blocks UDP traffic for DNS requests.
668
# [named-refused-udp]
669
#
670
# filter   = named-refused
34 - 671
# port     = domain,953
672
# protocol = udp
4 - 673
# logpath  = /var/log/named/security.log
674
 
675
# IMPORTANT: see filter.d/named-refused for instructions to enable logging
676
# This jail blocks TCP traffic for DNS requests.
677
 
34 - 678
[named-refused]
679
 
680
port     = domain,953
4 - 681
logpath  = /var/log/named/security.log
682
 
683
 
5 - 684
[nsd]
685
 
34 - 686
port     = 53
687
action   = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
688
           %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
5 - 689
logpath = /var/log/nsd.log
690
 
691
 
34 - 692
#
693
# Miscellaneous
694
#
695
 
4 - 696
[asterisk]
697
 
34 - 698
port     = 5060,5061
699
action   = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
700
           %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
701
           %(mta)s-whois[name=%(__name__)s, dest="%(destemail)s"]
4 - 702
logpath  = /var/log/asterisk/messages
703
maxretry = 10
704
 
5 - 705
 
706
[freeswitch]
707
 
34 - 708
port     = 5060,5061
709
action   = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
710
           %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
711
           %(mta)s-whois[name=%(__name__)s, dest="%(destemail)s"]
5 - 712
logpath  = /var/log/freeswitch.log
713
maxretry = 10
714
 
715
 
34 - 716
# To log wrong MySQL access attempts add to /etc/my.cnf in [mysqld] or
717
# equivalent section:
718
# log-warning = 2
719
#
720
# for syslog (daemon facility)
721
# [mysqld_safe]
722
# syslog
723
#
724
# for own logfile
725
# [mysqld]
726
# log-error=/var/log/mysqld.log
727
[mysqld-auth]
5 - 728
 
34 - 729
port     = 3306
730
logpath  = %(mysql_log)s
71 - 731
backend  = %(mysql_backend)s
4 - 732
 
733
 
87 - 734
# Log wrong MongoDB auth (for details see filter 'filter.d/mongodb-auth.conf')
735
[mongodb-auth]
736
# change port when running with "--shardsvr" or "--configsvr" runtime operation
737
port     = 27017
738
logpath  = /var/log/mongodb/mongodb.log
739
 
740
 
4 - 741
# Jail for more extended banning of persistent abusers
34 - 742
# !!! WARNINGS !!!
743
# 1. Make sure that your loglevel specified in fail2ban.conf/.local
744
#    is not at DEBUG level -- which might then cause fail2ban to fall into
745
#    an infinite loop constantly feeding itself with non-informative lines
746
# 2. Increase dbpurgeage defined in fail2ban.conf to e.g. 648000 (7.5 days)
747
#    to maintain entries for failed logins for sufficient amount of time
4 - 748
[recidive]
749
 
30 - 750
logpath  = /var/log/messages
71 - 751
banaction = %(banaction_allports)s
4 - 752
bantime  = 604800  ; 1 week
753
findtime = 86400   ; 1 day
754
 
755
 
34 - 756
# Generic filter for PAM. Has to be used with action which bans all
757
# ports such as iptables-allports, shorewall
4 - 758
 
34 - 759
[pam-generic]
760
# pam-generic filter can be customized to monitor specific subset of 'tty's
71 - 761
banaction = %(banaction_allports)s
34 - 762
logpath  = %(syslog_authpriv)s
71 - 763
backend  = %(syslog_backend)s
4 - 764
 
765
 
34 - 766
[xinetd-fail]
4 - 767
 
34 - 768
banaction = iptables-multiport-log
769
logpath   = %(syslog_daemon)s
71 - 770
backend   = %(syslog_backend)s
34 - 771
maxretry  = 2
4 - 772
 
773
 
34 - 774
# stunnel - need to set port for this
775
[stunnel]
4 - 776
 
34 - 777
logpath = /var/log/stunnel4/stunnel.log
4 - 778
 
779
 
34 - 780
[ejabberd-auth]
4 - 781
 
34 - 782
port    = 5222
783
logpath = /var/log/ejabberd/ejabberd.log
4 - 784
 
785
 
34 - 786
[counter-strike]
4 - 787
 
34 - 788
logpath = /opt/cstrike/logs/L[0-9]*.log
789
# Firewall: http://www.cstrike-planet.com/faq/6
790
tcpport = 27030,27031,27032,27033,27034,27035,27036,27037,27038,27039
791
udpport = 1200,27000,27001,27002,27003,27004,27005,27006,27007,27008,27009,27010,27011,27012,27013,27014,27015
792
action  = %(banaction)s[name=%(__name__)s-tcp, port="%(tcpport)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
793
           %(banaction)s[name=%(__name__)s-udp, port="%(udpport)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
4 - 794
 
34 - 795
# consider low maxretry and a long bantime
796
# nobody except your own Nagios server should ever probe nrpe
797
[nagios]
4 - 798
 
34 - 799
logpath  = %(syslog_daemon)s     ; nrpe.cfg may define a different log_facility
71 - 800
backend  = %(syslog_backend)s
34 - 801
maxretry = 1
4 - 802
 
803
 
34 - 804
[oracleims]
805
# see "oracleims" filter file for configuration requirement for Oracle IMS v6 and above
806
logpath = /opt/sun/comms/messaging64/log/mail.log_current
71 - 807
banaction = %(banaction_allports)s
4 - 808
 
34 - 809
[directadmin]
810
logpath = /var/log/directadmin/login.log
811
port = 2222
4 - 812
 
34 - 813
[portsentry]
814
logpath  = /var/lib/portsentry/portsentry.history
5 - 815
maxretry = 1
39 - 816
 
817
[pass2allow-ftp]
818
# this pass2allow example allows FTP traffic after successful HTTP authentication
819
port         = ftp,ftp-data,ftps,ftps-data
87 - 820
# knocking_url variable must be overridden to some secret value in jail.local
821
knocking_url = /knocking/
822
filter       = apache-pass[knocking_url="%(knocking_url)s"]
39 - 823
# access log of the website with HTTP auth
824
logpath      = %(apache_access_log)s
825
blocktype    = RETURN
826
returntype   = DROP
827
bantime      = 3600
828
maxretry     = 1
829
findtime     = 1
71 - 830
 
831
 
832
[murmur]
833
# AKA mumble-server
834
port     = 64738
835
action   = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol=tcp, chain="%(chain)s", actname=%(banaction)s-tcp]
836
           %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol=udp, chain="%(chain)s", actname=%(banaction)s-udp]
837
logpath  = /var/log/mumble-server/mumble-server.log
838
 
839
 
840
[screensharingd]
841
# For Mac OS Screen Sharing Service (VNC)
842
logpath  = /var/log/system.log
843
logencoding = utf-8
844
 
845
[haproxy-http-auth]
846
# HAProxy by default doesn't log to file you'll need to set it up to forward
847
# logs to a syslog server which would then write them to disk.
848
# See "haproxy-http-auth" filter for a brief cautionary note when setting
849
# maxretry and findtime.
850
logpath  = /var/log/haproxy.log
87 - 851
 
852
[slapd]
853
port    = ldap,ldaps
854
filter  = slapd
855
logpath = /var/log/slapd.log