Subversion Repositories configs

Rev

Rev 30 | Rev 39 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
4 - 1
#
34 - 2
# WARNING: heavily refactored in 0.9.0 release.  Please review and
3
#          customize settings for your setup.
4
#
5
# Changes:  in most of the cases you should not modify this
6
#           file, but provide customizations in jail.local file,
7
#           or separate .conf files under jail.d/ directory, e.g.:
8
#
4 - 9
# HOW TO ACTIVATE JAILS:
10
#
11
# YOU SHOULD NOT MODIFY THIS FILE.
12
#
34 - 13
# It will probably be overwritten or improved in a distribution update.
4 - 14
#
15
# Provide customizations in a jail.local file or a jail.d/customisation.local.
16
# For example to change the default bantime for all jails and to enable the
17
# ssh-iptables jail the following (uncommented) would appear in the .local file.
18
# See man 5 jail.conf for details.
19
#
20
# [DEFAULT]
21
# bantime = 3600
22
#
34 - 23
# [sshd]
4 - 24
# enabled = true
34 - 25
#
26
# See jail.conf(5) man page for more information
4 - 27
 
28
 
29
 
30
# Comments: use '#' for comment lines and ';' (following a space) for inline comments
31
 
34 - 32
 
33
[INCLUDES]
34
 
35
#before = paths-distro.conf
36
before = paths-fedora.conf
37
 
4 - 38
# The DEFAULT allows a global definition of the options. They can be overridden
39
# in each jail afterwards.
40
 
41
[DEFAULT]
42
 
34 - 43
#
44
# MISCELLANEOUS OPTIONS
45
#
46
 
4 - 47
# "ignoreip" can be an IP address, a CIDR mask or a DNS host. Fail2ban will not
48
# ban a host which matches an address in this list. Several addresses can be
49
# defined using space separator.
50
ignoreip = 127.0.0.1/8
51
 
5 - 52
# External command that will take an tagged arguments to ignore, e.g. <ip>,
53
# and return true if the IP is to be ignored. False otherwise.
54
#
55
# ignorecommand = /path/to/command <ip>
56
ignorecommand =
57
 
4 - 58
# "bantime" is the number of seconds that a host is banned.
59
bantime  = 600
60
 
61
# A host is banned if it has generated "maxretry" during the last "findtime"
62
# seconds.
63
findtime  = 600
64
 
65
# "maxretry" is the number of failures before a host get banned.
34 - 66
maxretry = 5
4 - 67
 
68
# "backend" specifies the backend used to get files modification.
34 - 69
# Available options are "pyinotify", "gamin", "polling", "systemd" and "auto".
4 - 70
# This option can be overridden in each jail as well.
71
#
72
# pyinotify: requires pyinotify (a file alteration monitor) to be installed.
73
#              If pyinotify is not installed, Fail2ban will use auto.
74
# gamin:     requires Gamin (a file alteration monitor) to be installed.
75
#              If Gamin is not installed, Fail2ban will use auto.
76
# polling:   uses a polling algorithm which does not require external libraries.
34 - 77
# systemd:   uses systemd python library to access the systemd journal.
78
#              Specifying "logpath" is not valid for this backend.
79
#              See "journalmatch" in the jails associated filter config
4 - 80
# auto:      will try to use the following backends, in order:
81
#              pyinotify, gamin, polling.
34 - 82
#
83
# Note: if systemd backend is choses as the default but you enable a jail
84
#       for which logs are present only in its own log files, specify some other
85
#       backend for that jail (e.g. polling) and provide empty value for
86
#       journalmatch. See https://github.com/fail2ban/fail2ban/issues/959#issuecomment-74901200
4 - 87
backend = auto
88
 
89
# "usedns" specifies if jails should trust hostnames in logs,
90
#   warn when DNS lookups are performed, or ignore all hostnames in logs
91
#
92
# yes:   if a hostname is encountered, a DNS lookup will be performed.
93
# warn:  if a hostname is encountered, a DNS lookup will be performed,
94
#        but it will be logged as a warning.
95
# no:    if a hostname is encountered, will not be used for banning,
96
#        but it will be logged as info.
97
usedns = warn
98
 
34 - 99
# "logencoding" specifies the encoding of the log files handled by the jail
100
#   This is used to decode the lines from the log file.
101
#   Typical examples:  "ascii", "utf-8"
102
#
103
#   auto:   will use the system locale setting
104
logencoding = auto
4 - 105
 
34 - 106
# "enabled" enables the jails.
107
#  By default all jails are disabled, and it should stay this way.
108
#  Enable only relevant to your setup jails in your .local or jail.d/*.conf
109
#
110
# true:  jail will be enabled and log files will get monitored for changes
111
# false: jail is not enabled
112
enabled = false
113
 
114
 
115
# "filter" defines the filter to use by the jail.
116
#  By default jails have names matching their filter name
117
#
118
filter = %(__name__)s
119
 
120
 
121
#
122
# ACTIONS
123
#
124
 
125
# Some options used for actions
126
 
127
# Destination email address used solely for the interpolations in
128
# jail.{conf,local,d/*} configuration files.
129
destemail = root@localhost
130
 
131
# Sender email address used solely for some actions
132
sender = root@localhost
133
 
134
# E-mail action. Since 0.8.1 Fail2Ban uses sendmail MTA for the
135
# mailing. Change mta configuration parameter to mail if you want to
136
# revert to conventional 'mail'.
137
mta = sendmail
138
 
139
# Default protocol
140
protocol = tcp
141
 
142
# Specify chain where jumps would need to be added in iptables-* actions
143
chain = INPUT
144
 
145
# Ports to be banned
146
# Usually should be overridden in a particular jail
147
port = 0:65535
148
 
149
#
150
# Action shortcuts. To be used to define action parameter
151
 
152
# Default banning action (e.g. iptables, iptables-new,
153
# iptables-multiport, shorewall, etc) It is used to define
154
# action_* variables. Can be overridden globally or per
155
# section within jail.local file
156
banaction = iptables-multiport
157
 
158
# The simplest action to take: ban only
159
action_ = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
160
 
161
# ban & send an e-mail with whois report to the destemail.
162
action_mw = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
163
            %(mta)s-whois[name=%(__name__)s, dest="%(destemail)s", protocol="%(protocol)s", chain="%(chain)s"]
164
 
165
# ban & send an e-mail with whois report and relevant log lines
166
# to the destemail.
167
action_mwl = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
168
             %(mta)s-whois-lines[name=%(__name__)s, dest="%(destemail)s", logpath=%(logpath)s, chain="%(chain)s"]
169
 
170
# See the IMPORTANT note in action.d/xarf-login-attack for when to use this action
171
#
172
# ban & send a xarf e-mail to abuse contact of IP address and include relevant log lines
173
# to the destemail.
174
action_xarf = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
175
             xarf-login-attack[service=%(__name__)s, sender="%(sender)s", logpath=%(logpath)s, port="%(port)s"]
176
 
177
 
178
# Report block via blocklist.de fail2ban reporting service API
179
#
180
# See the IMPORTANT note in action.d/blocklist_de.conf for when to
181
# use this action. Create a file jail.d/blocklist_de.local containing
182
# [Init]
183
# blocklist_de_apikey = {api key from registration]
184
#
185
action_blocklist_de  = blocklist_de[email="%(sender)s", service=%(filter)s, apikey="%(blocklist_de_apikey)s"]
186
 
187
# Report ban via badips.com, and use as blacklist
188
#
189
# See BadIPsAction docstring in config/action.d/badips.py for
190
# documentation for this action.
191
#
192
# NOTE: This action relies on banaction being present on start and therefore
193
# should be last action defined for a jail.
194
#
195
action_badips = badips.py[category="%(name)s", banaction="%(banaction)s"]
196
 
197
# Choose default action.  To change, just override value of 'action' with the
198
# interpolation to the chosen action shortcut (e.g.  action_mw, action_mwl, etc) in jail.local
199
# globally (section [DEFAULT]) or per specific section
200
action = %(action_)s
201
 
202
 
203
#
204
# JAILS
205
#
206
 
207
#
208
# SSH servers
209
#
210
 
211
[sshd]
212
 
213
port    = ssh
214
logpath = %(sshd_log)s
215
 
216
 
217
[sshd-ddos]
4 - 218
# This jail corresponds to the standard configuration in Fail2ban.
219
# The mail-whois action send a notification e-mail with a whois request
220
# in the body.
34 - 221
port    = ssh
222
logpath = %(sshd_log)s
4 - 223
 
5 - 224
 
34 - 225
[dropbear]
5 - 226
 
34 - 227
port     = ssh
228
logpath  = %(dropbear_log)s
5 - 229
 
230
 
34 - 231
[selinux-ssh]
5 - 232
 
34 - 233
port     = ssh
234
logpath  = %(auditd_log)s
235
maxretry = 5
5 - 236
 
4 - 237
 
34 - 238
#
239
# HTTP servers
240
#
4 - 241
 
34 - 242
[apache-auth]
5 - 243
 
34 - 244
port     = http,https
245
logpath  = %(apache_error_log)s
5 - 246
 
34 - 247
 
248
[apache-badbots]
249
# Ban hosts which agent identifies spammer robots crawling the web
250
# for email addresses. The mail outputs are buffered.
251
port     = http,https
252
logpath  = %(apache_access_log)s
253
bantime  = 172800
254
maxretry = 1
255
 
256
 
257
[apache-noscript]
258
 
259
port     = http,https
260
logpath  = %(apache_error_log)s
261
maxretry = 6
262
 
263
 
264
[apache-overflows]
265
 
266
port     = http,https
267
logpath  = %(apache_error_log)s
5 - 268
maxretry = 2
269
 
270
 
34 - 271
[apache-nohome]
5 - 272
 
34 - 273
port     = http,https
274
logpath  = %(apache_error_log)s
275
maxretry = 2
5 - 276
 
277
 
34 - 278
[apache-botsearch]
4 - 279
 
34 - 280
port     = http,https
281
logpath  = %(apache_error_log)s
282
maxretry = 2
4 - 283
 
284
 
34 - 285
[apache-fakegooglebot]
5 - 286
 
34 - 287
port     = http,https
288
logpath  = %(apache_access_log)s
289
maxretry = 1
290
ignorecommand = %(ignorecommands_dir)s/apache-fakegooglebot <ip>
5 - 291
 
292
 
34 - 293
[apache-modsecurity]
5 - 294
 
34 - 295
port     = http,https
296
logpath  = %(apache_error_log)s
297
maxretry = 2
5 - 298
 
34 - 299
[apache-shellshock]
5 - 300
 
34 - 301
port    = http,https
302
logpath = %(apache_error_log)s
303
maxretry = 1
5 - 304
 
34 - 305
[nginx-http-auth]
5 - 306
 
34 - 307
port    = http,https
308
logpath = %(nginx_error_log)s
5 - 309
 
34 - 310
[nginx-botsearch]
5 - 311
 
34 - 312
port     = http,https
313
logpath  = %(nginx_error_log)s
314
maxretry = 2
5 - 315
 
34 - 316
# Ban attackers that try to use PHP's URL-fopen() functionality
317
# through GET/POST variables. - Experimental, with more than a year
318
# of usage in production environments.
5 - 319
 
34 - 320
[php-url-fopen]
5 - 321
 
34 - 322
port    = http,https
323
logpath = %(nginx_access_log)s
324
          %(apache_access_log)s
5 - 325
 
326
 
34 - 327
[suhosin]
4 - 328
 
34 - 329
port    = http,https
330
logpath = %(suhosin_log)s
4 - 331
 
332
 
34 - 333
[lighttpd-auth]
334
# Same as above for Apache's mod_auth
335
# It catches wrong authentifications
336
port    = http,https
337
logpath = %(lighttpd_error_log)s
4 - 338
 
339
 
34 - 340
#
341
# Webmail and groupware servers
342
#
4 - 343
 
34 - 344
[roundcube-auth]
4 - 345
 
34 - 346
port     = http,https
347
logpath  = /var/log/roundcube/userlogins
4 - 348
 
349
 
34 - 350
[openwebmail]
4 - 351
 
34 - 352
port     = http,https
353
logpath  = /var/log/openwebmail.log
354
 
355
 
356
[horde]
357
 
358
port     = http,https
359
logpath  = /var/log/horde/horde.log
360
 
361
 
362
[groupoffice]
363
 
364
port     = http,https
365
logpath  = /home/groupoffice/log/info.log
366
 
367
 
368
[sogo-auth]
369
# Monitor SOGo groupware server
370
# without proxy this would be:
371
# port    = 20000
372
port     = http,https
373
logpath  = /var/log/sogo/sogo.log
374
 
375
 
376
[tine20]
377
 
378
logpath  = /var/log/tine20/tine20.log
379
port     = http,https
4 - 380
maxretry = 5
381
 
382
 
383
#
34 - 384
# Web Applications
385
#
386
#
4 - 387
 
34 - 388
[drupal-auth]
4 - 389
 
34 - 390
port     = http,https
391
logpath  = %(syslog_daemon)s
4 - 392
 
34 - 393
[guacamole]
4 - 394
 
34 - 395
port     = http,https
396
logpath  = /var/log/tomcat*/catalina.out
4 - 397
 
34 - 398
[monit]
399
#Ban clients brute-forcing the monit gui login
400
filter   = monit
401
port = 2812
402
logpath  = /var/log/monit
4 - 403
 
34 - 404
 
405
[webmin-auth]
406
 
407
port    = 10000
408
logpath = %(syslog_authpriv)s
409
 
410
 
4 - 411
#
34 - 412
# HTTP Proxy servers
413
#
414
#
4 - 415
 
34 - 416
[squid]
4 - 417
 
34 - 418
port     =  80,443,3128,8080
419
logpath = /var/log/squid/access.log
4 - 420
 
421
 
34 - 422
[3proxy]
423
 
424
port    = 3128
425
logpath = /var/log/3proxy.log
426
 
427
#
428
# FTP servers
429
#
430
 
431
 
432
[proftpd]
433
 
434
port     = ftp,ftp-data,ftps,ftps-data
435
logpath  = %(proftpd_log)s
436
 
437
 
438
[pure-ftpd]
439
 
440
port     = ftp,ftp-data,ftps,ftps-data
441
logpath  = %(pureftpd_log)s
4 - 442
maxretry = 6
443
 
444
 
34 - 445
[gssftpd]
5 - 446
 
34 - 447
port     = ftp,ftp-data,ftps,ftps-data
448
logpath  = %(syslog_daemon)s
449
maxretry = 6
5 - 450
 
451
 
34 - 452
[wuftpd]
5 - 453
 
34 - 454
port     = ftp,ftp-data,ftps,ftps-data
455
logpath  = %(wuftpd_log)s
456
maxretry = 6
5 - 457
 
458
 
34 - 459
[vsftpd]
460
# or overwrite it in jails.local to be
461
# logpath = %(syslog_authpriv)s
462
# if you want to rely on PAM failed login attempts
463
# vsftpd's failregex should match both of those formats
464
port     = ftp,ftp-data,ftps,ftps-data
465
logpath  = %(vsftpd_log)s
5 - 466
 
467
 
34 - 468
#
469
# Mail servers
470
#
5 - 471
 
34 - 472
# ASSP SMTP Proxy Jail
473
[assp]
4 - 474
 
34 - 475
port     = smtp,465,submission
476
logpath  = /root/path/to/assp/logs/maillog.txt
4 - 477
 
478
 
34 - 479
[courier-smtp]
5 - 480
 
34 - 481
port     = smtp,465,submission
482
logpath  = %(syslog_mail)s
5 - 483
 
484
 
34 - 485
[postfix]
4 - 486
 
34 - 487
port     = smtp,465,submission
488
logpath  = %(postfix_log)s
4 - 489
 
490
 
34 - 491
[postfix-rbl]
5 - 492
 
34 - 493
port     = smtp,465,submission
494
logpath  = %(syslog_mail)s
495
maxretry = 1
5 - 496
 
497
 
34 - 498
[sendmail-auth]
5 - 499
 
34 - 500
port    = submission,465,smtp
501
logpath = %(syslog_mail)s
5 - 502
 
503
 
34 - 504
[sendmail-reject]
5 - 505
 
34 - 506
port     = smtp,465,submission
507
logpath  = %(syslog_mail)s
5 - 508
 
509
 
510
[qmail-rbl]
511
 
512
filter  = qmail
34 - 513
port    = smtp,465,submission
5 - 514
logpath = /service/qmail/log/main/current
515
 
516
 
34 - 517
# dovecot defaults to logging to the mail syslog facility
518
# but can be set by syslog_facility in the dovecot configuration.
519
[dovecot]
5 - 520
 
34 - 521
port    = pop3,pop3s,imap,imaps,submission,465,sieve
522
logpath = %(dovecot_log)s
5 - 523
 
524
 
34 - 525
[sieve]
4 - 526
 
34 - 527
port   = smtp,465,submission
528
logpath = %(dovecot_log)s
4 - 529
 
530
 
34 - 531
[solid-pop3d]
4 - 532
 
34 - 533
port    = pop3,pop3s
534
logpath = %(solidpop3d_log)s
4 - 535
 
536
 
34 - 537
[exim]
4 - 538
 
34 - 539
port   = smtp,465,submission
540
logpath = %(exim_main_log)s
4 - 541
 
542
 
34 - 543
[exim-spam]
4 - 544
 
34 - 545
port   = smtp,465,submission
546
logpath = %(exim_main_log)s
4 - 547
 
548
 
34 - 549
[kerio]
4 - 550
 
34 - 551
port    = imap,smtp,imaps,465
552
logpath = /opt/kerio/mailserver/store/logs/security.log
4 - 553
 
554
 
34 - 555
#
556
# Mail servers authenticators: might be used for smtp,ftp,imap servers, so
557
# all relevant ports get banned
558
#
4 - 559
 
34 - 560
[courier-auth]
4 - 561
 
34 - 562
port     = smtp,465,submission,imap3,imaps,pop3,pop3s
563
logpath  = %(syslog_mail)s
4 - 564
 
5 - 565
 
34 - 566
[postfix-sasl]
5 - 567
 
34 - 568
port     = smtp,465,submission,imap3,imaps,pop3,pop3s
569
# You might consider monitoring /var/log/mail.warn instead if you are
570
# running postfix since it would provide the same log lines at the
571
# "warn" level but overall at the smaller filesize.
572
logpath  = %(postfix_log)s
5 - 573
 
574
 
34 - 575
[perdition]
5 - 576
 
34 - 577
port   = imap3,imaps,pop3,pop3s
578
logpath = %(syslog_mail)s
5 - 579
 
580
 
34 - 581
[squirrelmail]
5 - 582
 
34 - 583
port = smtp,465,submission,imap2,imap3,imaps,pop3,pop3s,http,https,socks
584
logpath = /var/lib/squirrelmail/prefs/squirrelmail_access_log
5 - 585
 
4 - 586
 
34 - 587
[cyrus-imap]
4 - 588
 
34 - 589
port   = imap3,imaps
590
logpath = %(syslog_mail)s
4 - 591
 
592
 
34 - 593
[uwimap-auth]
4 - 594
 
34 - 595
port   = imap3,imaps
596
logpath = %(syslog_mail)s
4 - 597
 
598
 
34 - 599
#
600
#
601
# DNS servers
602
#
4 - 603
 
604
 
605
# !!! WARNING !!!
606
#   Since UDP is connection-less protocol, spoofing of IP and imitation
607
#   of illegal actions is way too simple.  Thus enabling of this filter
608
#   might provide an easy way for implementing a DoS against a chosen
609
#   victim. See
610
#    http://nion.modprobe.de/blog/archives/690-fail2ban-+-dns-fail.html
611
#   Please DO NOT USE this jail unless you know what you are doing.
612
#
613
# IMPORTANT: see filter.d/named-refused for instructions to enable logging
614
# This jail blocks UDP traffic for DNS requests.
615
# [named-refused-udp]
616
#
617
# filter   = named-refused
34 - 618
# port     = domain,953
619
# protocol = udp
4 - 620
# logpath  = /var/log/named/security.log
621
 
622
# IMPORTANT: see filter.d/named-refused for instructions to enable logging
623
# This jail blocks TCP traffic for DNS requests.
624
 
34 - 625
[named-refused]
626
 
627
port     = domain,953
4 - 628
logpath  = /var/log/named/security.log
629
 
630
 
5 - 631
[nsd]
632
 
34 - 633
port     = 53
634
action   = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
635
           %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
5 - 636
logpath = /var/log/nsd.log
637
 
638
 
34 - 639
#
640
# Miscellaneous
641
#
642
 
4 - 643
[asterisk]
644
 
34 - 645
port     = 5060,5061
646
action   = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
647
           %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
648
           %(mta)s-whois[name=%(__name__)s, dest="%(destemail)s"]
4 - 649
logpath  = /var/log/asterisk/messages
650
maxretry = 10
651
 
5 - 652
 
653
[freeswitch]
654
 
34 - 655
port     = 5060,5061
656
action   = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
657
           %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
658
           %(mta)s-whois[name=%(__name__)s, dest="%(destemail)s"]
5 - 659
logpath  = /var/log/freeswitch.log
660
maxretry = 10
661
 
662
 
34 - 663
# To log wrong MySQL access attempts add to /etc/my.cnf in [mysqld] or
664
# equivalent section:
665
# log-warning = 2
666
#
667
# for syslog (daemon facility)
668
# [mysqld_safe]
669
# syslog
670
#
671
# for own logfile
672
# [mysqld]
673
# log-error=/var/log/mysqld.log
674
[mysqld-auth]
5 - 675
 
34 - 676
port     = 3306
677
logpath  = %(mysql_log)s
4 - 678
maxretry = 5
679
 
680
 
681
# Jail for more extended banning of persistent abusers
34 - 682
# !!! WARNINGS !!!
683
# 1. Make sure that your loglevel specified in fail2ban.conf/.local
684
#    is not at DEBUG level -- which might then cause fail2ban to fall into
685
#    an infinite loop constantly feeding itself with non-informative lines
686
# 2. Increase dbpurgeage defined in fail2ban.conf to e.g. 648000 (7.5 days)
687
#    to maintain entries for failed logins for sufficient amount of time
4 - 688
[recidive]
689
 
30 - 690
logpath  = /var/log/messages
34 - 691
banaction = iptables-allports
4 - 692
bantime  = 604800  ; 1 week
693
findtime = 86400   ; 1 day
694
maxretry = 5
695
 
696
 
34 - 697
# Generic filter for PAM. Has to be used with action which bans all
698
# ports such as iptables-allports, shorewall
4 - 699
 
34 - 700
[pam-generic]
701
# pam-generic filter can be customized to monitor specific subset of 'tty's
702
banaction = iptables-allports
703
logpath  = %(syslog_authpriv)s
4 - 704
 
705
 
34 - 706
[xinetd-fail]
4 - 707
 
34 - 708
banaction = iptables-multiport-log
709
logpath   = %(syslog_daemon)s
710
maxretry  = 2
4 - 711
 
712
 
34 - 713
# stunnel - need to set port for this
714
[stunnel]
4 - 715
 
34 - 716
logpath = /var/log/stunnel4/stunnel.log
4 - 717
 
718
 
34 - 719
[ejabberd-auth]
4 - 720
 
34 - 721
port    = 5222
722
logpath = /var/log/ejabberd/ejabberd.log
4 - 723
 
724
 
34 - 725
[counter-strike]
4 - 726
 
34 - 727
logpath = /opt/cstrike/logs/L[0-9]*.log
728
# Firewall: http://www.cstrike-planet.com/faq/6
729
tcpport = 27030,27031,27032,27033,27034,27035,27036,27037,27038,27039
730
udpport = 1200,27000,27001,27002,27003,27004,27005,27006,27007,27008,27009,27010,27011,27012,27013,27014,27015
731
action  = %(banaction)s[name=%(__name__)s-tcp, port="%(tcpport)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
732
           %(banaction)s[name=%(__name__)s-udp, port="%(udpport)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
4 - 733
 
34 - 734
# consider low maxretry and a long bantime
735
# nobody except your own Nagios server should ever probe nrpe
736
[nagios]
4 - 737
 
738
enabled  = false
34 - 739
logpath  = %(syslog_daemon)s     ; nrpe.cfg may define a different log_facility
740
maxretry = 1
4 - 741
 
742
 
34 - 743
[oracleims]
744
# see "oracleims" filter file for configuration requirement for Oracle IMS v6 and above
4 - 745
enabled = false
34 - 746
logpath = /opt/sun/comms/messaging64/log/mail.log_current
747
maxretry = 6
748
banaction = iptables-allports
4 - 749
 
34 - 750
[directadmin]
4 - 751
enabled = false
34 - 752
logpath = /var/log/directadmin/login.log
753
port = 2222
4 - 754
 
34 - 755
[portsentry]
5 - 756
enabled  = false
34 - 757
logpath  = /var/lib/portsentry/portsentry.history
5 - 758
maxretry = 1