Subversion Repositories configs

Rev

Rev 4 | Rev 30 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
4 - 1
# Fail2Ban jail base specification file
2
#
3
# HOW TO ACTIVATE JAILS:
4
#
5
# YOU SHOULD NOT MODIFY THIS FILE.
6
#
7
# It will probably be overwitten or improved in a distribution update.
8
#
9
# Provide customizations in a jail.local file or a jail.d/customisation.local.
10
# For example to change the default bantime for all jails and to enable the
11
# ssh-iptables jail the following (uncommented) would appear in the .local file.
12
# See man 5 jail.conf for details.
13
#
14
# [DEFAULT]
15
# bantime = 3600
16
#
17
# [ssh-iptables]
18
# enabled = true
19
 
20
 
21
 
22
# Comments: use '#' for comment lines and ';' (following a space) for inline comments
23
 
24
# The DEFAULT allows a global definition of the options. They can be overridden
25
# in each jail afterwards.
26
 
27
[DEFAULT]
28
 
29
# "ignoreip" can be an IP address, a CIDR mask or a DNS host. Fail2ban will not
30
# ban a host which matches an address in this list. Several addresses can be
31
# defined using space separator.
32
ignoreip = 127.0.0.1/8
33
 
5 - 34
# External command that will take an tagged arguments to ignore, e.g. <ip>,
35
# and return true if the IP is to be ignored. False otherwise.
36
#
37
# ignorecommand = /path/to/command <ip>
38
ignorecommand =
39
 
4 - 40
# "bantime" is the number of seconds that a host is banned.
41
bantime  = 600
42
 
43
# A host is banned if it has generated "maxretry" during the last "findtime"
44
# seconds.
45
findtime  = 600
46
 
47
# "maxretry" is the number of failures before a host get banned.
48
maxretry = 3
49
 
50
# "backend" specifies the backend used to get files modification.
51
# Available options are "pyinotify", "gamin", "polling" and "auto".
52
# This option can be overridden in each jail as well.
53
#
54
# pyinotify: requires pyinotify (a file alteration monitor) to be installed.
55
#              If pyinotify is not installed, Fail2ban will use auto.
56
# gamin:     requires Gamin (a file alteration monitor) to be installed.
57
#              If Gamin is not installed, Fail2ban will use auto.
58
# polling:   uses a polling algorithm which does not require external libraries.
59
# auto:      will try to use the following backends, in order:
60
#              pyinotify, gamin, polling.
61
backend = auto
62
 
63
# "usedns" specifies if jails should trust hostnames in logs,
64
#   warn when DNS lookups are performed, or ignore all hostnames in logs
65
#
66
# yes:   if a hostname is encountered, a DNS lookup will be performed.
67
# warn:  if a hostname is encountered, a DNS lookup will be performed,
68
#        but it will be logged as a warning.
69
# no:    if a hostname is encountered, will not be used for banning,
70
#        but it will be logged as info.
71
usedns = warn
72
 
73
 
74
# This jail corresponds to the standard configuration in Fail2ban.
75
# The mail-whois action send a notification e-mail with a whois request
76
# in the body.
77
 
5 - 78
[pam-generic]
79
 
80
enabled = false
81
filter  = pam-generic
82
action  = iptables-allports[name=pam,protocol=all]
83
logpath = /var/log/secure
84
 
85
 
86
[xinetd-fail]
87
 
88
enabled = false
89
filter  = xinetd-fail
90
action  = iptables-allports[name=xinetd,protocol=all]
91
logpath = /var/log/daemon*log
92
 
93
 
4 - 94
[ssh-iptables]
95
 
96
enabled  = true
97
filter   = sshd
98
action   = iptables[name=SSH, port=ssh, protocol=tcp]
5 - 99
           sendmail-whois[name=SSH, dest=you@example.com, sender=fail2ban@example.com, sendername="Fail2Ban"]
4 - 100
logpath  = /var/log/secure
101
maxretry = 5
102
 
5 - 103
 
104
[ssh-ddos]
105
 
106
enabled  = false
107
filter   = sshd-ddos
108
action   = iptables[name=SSHDDOS, port=ssh, protocol=tcp]
109
logpath  = /var/log/sshd.log
110
maxretry = 2
111
 
112
 
113
[dropbear]
114
 
115
enabled  = false
116
filter   = dropbear
117
action   = iptables[name=dropbear, port=ssh, protocol=tcp]
118
logpath  = /var/log/messages
119
maxretry = 5
120
 
121
 
4 - 122
[proftpd-iptables]
123
 
124
enabled  = false
125
filter   = proftpd
126
action   = iptables[name=ProFTPD, port=ftp, protocol=tcp]
127
           sendmail-whois[name=ProFTPD, dest=you@example.com]
128
logpath  = /var/log/proftpd/proftpd.log
129
maxretry = 6
130
 
131
 
5 - 132
[gssftpd-iptables]
133
 
134
enabled  = false
135
filter   = gssftpd
136
action   = iptables[name=GSSFTPd, port=ftp, protocol=tcp]
137
           sendmail-whois[name=GSSFTPd, dest=you@example.com]
138
logpath  = /var/log/daemon.log
139
maxretry = 6
140
 
141
 
142
[pure-ftpd]
143
 
144
enabled  = false
145
filter   = pure-ftpd
146
action   = iptables[name=pureftpd, port=ftp, protocol=tcp]
147
logpath  = /var/log/pureftpd.log
148
maxretry = 6
149
 
150
 
151
[wuftpd]
152
 
153
enabled  = false
154
filter   = wuftpd
155
action   = iptables[name=wuftpd, port=ftp, protocol=tcp]
156
logpath  = /var/log/daemon.log
157
maxretry = 6
158
 
159
 
160
[sendmail-auth]
161
 
162
enabled  = false
163
filter   = sendmail-auth
164
action   = iptables-multiport[name=sendmail-auth, port="submission,465,smtp", protocol=tcp]
165
logpath  = /var/log/mail.log
166
 
167
 
168
[sendmail-reject]
169
 
170
enabled  = false
171
filter   = sendmail-reject
172
action   = iptables-multiport[name=sendmail-auth, port="submission,465,smtp", protocol=tcp]
173
logpath  = /var/log/mail.log
174
 
175
 
4 - 176
# This jail forces the backend to "polling".
177
[sasl-iptables]
178
 
179
enabled  = false
180
filter   = postfix-sasl
181
backend  = polling
182
action   = iptables[name=sasl, port=smtp, protocol=tcp]
183
           sendmail-whois[name=sasl, dest=you@example.com]
184
logpath  = /var/log/mail.log
185
 
186
 
187
# ASSP SMTP Proxy Jail
188
[assp]
189
 
190
enabled = false
191
filter  = assp
192
action  = iptables-multiport[name=assp,port="25,465,587"]
193
logpath = /root/path/to/assp/logs/maillog.txt
194
 
195
 
196
# Here we use TCP-Wrappers instead of Netfilter/Iptables. "ignoreregex" is
197
# used to avoid banning the user "myuser".
198
[ssh-tcpwrapper]
199
 
200
enabled     = false
201
filter      = sshd
202
action      = hostsdeny[daemon_list=sshd]
203
              sendmail-whois[name=SSH, dest=you@example.com]
204
ignoreregex = for myuser from
205
logpath     = /var/log/sshd.log
206
 
207
 
208
# Here we use blackhole routes for not requiring any additional kernel support
209
# to store large volumes of banned IPs
210
[ssh-route]
211
 
212
enabled  = false
213
filter   = sshd
214
action   = route
215
logpath  = /var/log/sshd.log
216
maxretry = 5
217
 
218
 
219
# Here we use a combination of Netfilter/Iptables and IPsets
220
# for storing large volumes of banned IPs
221
#
222
# IPset comes in two versions. See ipset -V for which one to use
223
# requires the ipset package and kernel support.
224
[ssh-iptables-ipset4]
225
 
226
enabled  = false
227
filter   = sshd
228
action   = iptables-ipset-proto4[name=SSH, port=ssh, protocol=tcp]
229
logpath  = /var/log/sshd.log
230
maxretry = 5
231
 
232
 
233
[ssh-iptables-ipset6]
234
 
235
enabled  = false
236
filter   = sshd
237
action   = iptables-ipset-proto6[name=SSH, port=ssh, protocol=tcp, bantime=600]
238
logpath  = /var/log/sshd.log
239
maxretry = 5
240
 
241
 
242
# bsd-ipfw is ipfw used by BSD. It uses ipfw tables.
243
# table number must be unique.
244
#
245
# This will create a deny rule for that table ONLY if a rule
246
# for the table doesn't ready exist.
247
#
248
[ssh-bsd-ipfw]
249
 
250
enabled  = false
251
filter   = sshd
252
action   = bsd-ipfw[port=ssh,table=1]
253
logpath  = /var/log/auth.log
254
maxretry = 5
255
 
256
 
257
# This jail demonstrates the use of wildcards in "logpath".
258
# Moreover, it is possible to give other files on a new line.
259
[apache-tcpwrapper]
260
 
261
enabled  = false
262
filter	 = apache-auth
263
action   = hostsdeny
264
logpath  = /var/log/apache*/*error.log
265
           /home/www/myhomepage/error.log
266
maxretry = 6
267
 
268
 
5 - 269
[apache-modsecurity]
270
 
271
enabled  = false
272
filter	 = apache-modsecurity
273
action   = iptables-multiport[name=apache-modsecurity,port="80,443"]
274
logpath  = /var/log/apache*/*error.log
275
           /home/www/myhomepage/error.log
276
maxretry = 2
277
 
278
 
279
[apache-overflows]
280
 
281
enabled  = false
282
filter	 = apache-overflows
283
action   = iptables-multiport[name=apache-overflows,port="80,443"]
284
logpath  = /var/log/apache*/*error.log
285
           /home/www/myhomepage/error.log
286
maxretry = 2
287
 
288
 
289
[apache-nohome]
290
 
291
enabled  = false
292
filter	 = apache-nohome
293
action   = iptables-multiport[name=apache-nohome,port="80,443"]
294
logpath  = /var/log/apache*/*error.log
295
           /home/www/myhomepage/error.log
296
maxretry = 2
297
 
298
 
4 - 299
[nginx-http-auth]
300
 
301
enabled = false
302
filter  = nginx-http-auth
303
action  = iptables-multiport[name=nginx-http-auth,port="80,443"]
304
logpath = /var/log/nginx/error.log
305
 
306
 
5 - 307
[squid]
308
 
309
enabled = false
310
filter  = squid
311
action  = iptables-multiport[name=squid,port="80,443,8080"]
312
logpath = /var/log/squid/access.log
313
 
314
 
4 - 315
# The hosts.deny path can be defined with the "file" argument if it is
316
# not in /etc.
317
[postfix-tcpwrapper]
318
 
319
enabled  = false
320
filter   = postfix
321
action   = hostsdeny[file=/not/a/standard/path/hosts.deny]
322
           sendmail[name=Postfix, dest=you@example.com]
323
logpath  = /var/log/postfix.log
324
bantime  = 300
325
 
326
 
5 - 327
[cyrus-imap]
328
 
329
enabled = false
330
filter  = cyrus-imap
331
action  = iptables-multiport[name=cyrus-imap,port="143,993"]
332
logpath = /var/log/mail*log
333
 
334
 
335
[courierlogin]
336
 
337
enabled = false
338
filter  = courierlogin
339
action  = iptables-multiport[name=courierlogin,port="25,110,143,465,587,993,995"]
340
logpath = /var/log/mail*log
341
 
342
 
343
[couriersmtp]
344
 
345
enabled = false
346
filter  = couriersmtp
347
action  = iptables-multiport[name=couriersmtp,port="25,465,587"]
348
logpath = /var/log/mail*log
349
 
350
 
351
[qmail-rbl]
352
 
353
enabled = false
354
filter  = qmail
355
action  = iptables-multiport[name=qmail-rbl,port="25,465,587"]
356
logpath = /service/qmail/log/main/current
357
 
358
 
359
[sieve]
360
 
361
enabled = false
362
filter  = sieve
363
action  = iptables-multiport[name=sieve,port="25,465,587"]
364
logpath = /var/log/mail*log
365
 
366
 
4 - 367
# Do not ban anybody. Just report information about the remote host.
368
# A notification is sent at most every 600 seconds (bantime).
369
[vsftpd-notification]
370
 
371
enabled  = false
372
filter   = vsftpd
373
action   = sendmail-whois[name=VSFTPD, dest=you@example.com]
374
logpath  = /var/log/vsftpd.log
375
maxretry = 5
376
bantime  = 1800
377
 
378
 
379
# Same as above but with banning the IP address.
380
[vsftpd-iptables]
381
 
382
enabled  = false
383
filter   = vsftpd
384
action   = iptables[name=VSFTPD, port=ftp, protocol=tcp]
385
           sendmail-whois[name=VSFTPD, dest=you@example.com]
386
logpath  = /var/log/vsftpd.log
387
maxretry = 5
388
bantime  = 1800
389
 
390
 
391
# Ban hosts which agent identifies spammer robots crawling the web
392
# for email addresses. The mail outputs are buffered.
393
[apache-badbots]
394
 
395
enabled  = false
396
filter   = apache-badbots
397
action   = iptables-multiport[name=BadBots, port="http,https"]
398
           sendmail-buffered[name=BadBots, lines=5, dest=you@example.com]
399
logpath  = /var/www/*/logs/access_log
400
bantime  = 172800
401
maxretry = 1
402
 
403
 
404
# Use shorewall instead of iptables.
405
[apache-shorewall]
406
 
407
enabled  = false
408
filter   = apache-noscript
409
action   = shorewall
410
           sendmail[name=Postfix, dest=you@example.com]
411
logpath  = /var/log/apache2/error_log
412
 
413
 
414
# Monitor roundcube server
415
[roundcube-iptables]
416
 
417
enabled  = false
418
filter   = roundcube-auth
419
action   = iptables-multiport[name=RoundCube, port="http,https"]
420
logpath  = /var/log/roundcube/userlogins
421
 
422
 
423
# Monitor SOGo groupware server
424
[sogo-iptables]
425
 
426
enabled  = false
427
filter   = sogo-auth
428
# without proxy this would be:
429
# port    = 20000
430
action   = iptables-multiport[name=SOGo, port="http,https"]
431
logpath  = /var/log/sogo/sogo.log
432
 
433
 
5 - 434
[groupoffice]
435
 
436
enabled  = false
437
filter   = groupoffice
438
action   = iptables-multiport[name=groupoffice, port="http,https"]
439
logpath  = /home/groupoffice/log/info.log
440
 
441
 
442
[openwebmail]
443
 
444
enabled  = false
445
filter   = openwebmail
446
logpath  = /var/log/openwebmail.log
447
action   = ipfw
448
           sendmail-whois[name=openwebmail, dest=you@example.com]
449
maxretry = 5
450
 
451
 
452
[horde]
453
 
454
enabled  = false
455
filter   = horde
456
logpath  = /var/log/horde/horde.log
457
action   = iptables-multiport[name=horde, port="http,https"]
458
maxretry = 5
459
 
460
 
4 - 461
# Ban attackers that try to use PHP's URL-fopen() functionality
462
# through GET/POST variables. - Experimental, with more than a year
463
# of usage in production environments.
464
[php-url-fopen]
465
 
466
enabled  = false
467
action   = iptables-multiport[name=php-url-open, port="http,https"]
468
filter   = php-url-fopen
469
logpath  = /var/www/*/logs/access_log
470
maxretry = 1
471
 
472
 
473
[suhosin]
474
 
475
enabled  = false
476
filter   = suhosin
477
action   = iptables-multiport[name=suhosin, port="http,https"]
478
# adapt the following two items as needed
479
logpath  = /var/log/lighttpd/error.log
480
maxretry = 2
481
 
482
 
483
[lighttpd-auth]
484
 
485
enabled  = false
486
filter   = lighttpd-auth
487
action   = iptables-multiport[name=lighttpd-auth, port="http,https"]
488
# adapt the following two items as needed
489
logpath  = /var/log/lighttpd/error.log
490
maxretry = 2
491
 
492
 
493
# This jail uses ipfw, the standard firewall on FreeBSD. The "ignoreip"
494
# option is overridden in this jail. Moreover, the action "mail-whois" defines
495
# the variable "name" which contains a comma using "". The characters '' are
496
# valid too.
497
[ssh-ipfw]
498
 
499
enabled  = false
500
filter   = sshd
501
action   = ipfw[localhost=192.168.0.1]
502
           sendmail-whois[name="SSH,IPFW", dest=you@example.com]
503
logpath  = /var/log/auth.log
504
ignoreip = 168.192.0.1
505
 
506
 
507
# !!! WARNING !!!
508
#   Since UDP is connection-less protocol, spoofing of IP and imitation
509
#   of illegal actions is way too simple.  Thus enabling of this filter
510
#   might provide an easy way for implementing a DoS against a chosen
511
#   victim. See
512
#    http://nion.modprobe.de/blog/archives/690-fail2ban-+-dns-fail.html
513
#   Please DO NOT USE this jail unless you know what you are doing.
514
#
515
# IMPORTANT: see filter.d/named-refused for instructions to enable logging
516
# This jail blocks UDP traffic for DNS requests.
517
# [named-refused-udp]
518
#
519
# enabled  = false
520
# filter   = named-refused
521
# action   = iptables-multiport[name=Named, port="domain,953", protocol=udp]
522
#            sendmail-whois[name=Named, dest=you@example.com]
523
# logpath  = /var/log/named/security.log
524
# ignoreip = 168.192.0.1
525
 
526
# IMPORTANT: see filter.d/named-refused for instructions to enable logging
527
# This jail blocks TCP traffic for DNS requests.
528
[named-refused-tcp]
529
 
530
enabled  = false
531
filter   = named-refused
532
action   = iptables-multiport[name=Named, port="domain,953", protocol=tcp]
533
           sendmail-whois[name=Named, dest=you@example.com]
534
logpath  = /var/log/named/security.log
535
ignoreip = 168.192.0.1
536
 
537
 
5 - 538
[nsd]
539
 
540
enabled = false
541
filter  = nsd
542
action  = iptables-multiport[name=nsd-tcp, port="domain", protocol=tcp]
543
          iptables-multiport[name=nsd-udp, port="domain", protocol=udp]
544
logpath = /var/log/nsd.log
545
 
546
 
4 - 547
[asterisk]
548
 
549
enabled  = false
550
filter   = asterisk
551
action   = iptables-multiport[name=asterisk-tcp, port="5060,5061", protocol=tcp]
552
           iptables-multiport[name=asterisk-udp, port="5060,5061", protocol=udp]
553
           sendmail-whois[name=Asterisk, dest=you@example.com, sender=fail2ban@example.com]
554
logpath  = /var/log/asterisk/messages
555
maxretry = 10
556
 
5 - 557
 
558
[freeswitch]
559
 
560
enabled  = false
561
filter   = freeswitch
562
logpath  = /var/log/freeswitch.log
563
maxretry = 10
564
action   = iptables-multiport[name=freeswitch-tcp, port="5060,5061,5080,5081", protocol=tcp]
565
           iptables-multiport[name=freeswitch-udp, port="5060,5061,5080,5081", protocol=udp]
566
 
567
[ejabberd-auth]
568
 
569
enabled = false
570
filter = ejabberd-auth
571
logpath = /var/log/ejabberd/ejabberd.log
572
action   = iptables[name=ejabberd, port=xmpp-client, protocol=tcp]
573
 
4 - 574
#  Historical support (before https://github.com/fail2ban/fail2ban/issues/37 was fixed )
575
#  use [asterisk] for new jails
576
[asterisk-tcp]
577
 
578
enabled  = false
579
filter   = asterisk
580
action   = iptables-multiport[name=asterisk-tcp, port="5060,5061", protocol=tcp]
581
           sendmail-whois[name=Asterisk, dest=you@example.com, sender=fail2ban@example.com]
582
logpath  = /var/log/asterisk/messages
583
maxretry = 10
584
 
585
 
586
#  Historical support (before https://github.com/fail2ban/fail2ban/issues/37 was fixed )
587
#  use [asterisk] for new jails
588
[asterisk-udp]
589
 
590
enabled  = false
591
filter	 = asterisk
592
action   = iptables-multiport[name=asterisk-udp, port="5060,5061", protocol=udp]
593
           sendmail-whois[name=Asterisk, dest=you@example.com, sender=fail2ban@example.com]
594
logpath  = /var/log/asterisk/messages
595
maxretry = 10
596
 
597
 
598
[mysqld-iptables]
599
 
600
enabled  = false
601
filter   = mysqld-auth
602
action   = iptables[name=mysql, port=3306, protocol=tcp]
603
           sendmail-whois[name=MySQL, dest=root, sender=fail2ban@example.com]
604
logpath  = /var/log/mysqld.log
605
maxretry = 5
606
 
607
 
5 - 608
[mysqld-syslog]
4 - 609
 
610
enabled  = false
611
filter   = mysqld-auth
612
action   = iptables[name=mysql, port=3306, protocol=tcp]
613
logpath  = /var/log/daemon.log
614
maxretry = 5
615
 
616
 
617
# Jail for more extended banning of persistent abusers
618
# !!! WARNING !!!
619
#   Make sure that your loglevel specified in fail2ban.conf/.local
620
#   is not at DEBUG level -- which might then cause fail2ban to fall into
621
#   an infinite loop constantly feeding itself with non-informative lines
622
[recidive]
623
 
624
enabled  = false
625
filter   = recidive
626
logpath  = /var/log/fail2ban.log
5 - 627
action   = iptables-allports[name=recidive,protocol=all]
4 - 628
           sendmail-whois-lines[name=recidive, logpath=/var/log/fail2ban.log]
629
bantime  = 604800  ; 1 week
630
findtime = 86400   ; 1 day
631
maxretry = 5
632
 
633
 
634
# PF is a BSD based firewall
635
[ssh-pf]
636
 
637
enabled  = false
638
filter   = sshd
639
action   = pf
640
logpath  = /var/log/sshd.log
641
maxretry = 5
642
 
643
 
644
[3proxy]
645
 
646
enabled = false
647
filter  = 3proxy
648
action  = iptables[name=3proxy, port=3128, protocol=tcp]
649
logpath = /var/log/3proxy.log
650
 
651
 
652
[exim]
653
 
654
enabled = false
655
filter  = exim
656
action  = iptables-multiport[name=exim,port="25,465,587"]
657
logpath = /var/log/exim/mainlog
658
 
659
 
660
[exim-spam]
661
 
662
enabled = false
663
filter  = exim-spam
664
action  = iptables-multiport[name=exim-spam,port="25,465,587"]
665
logpath = /var/log/exim/mainlog
666
 
667
 
668
[perdition]
669
 
670
enabled = false
671
filter  = perdition
672
action  = iptables-multiport[name=perdition,port="110,143,993,995"]
673
logpath = /var/log/maillog
674
 
675
 
676
[uwimap-auth]
677
 
678
enabled = false
679
filter  = uwimap-auth
680
action  = iptables-multiport[name=uwimap-auth,port="110,143,993,995"]
681
logpath = /var/log/maillog
682
 
683
 
684
[osx-ssh-ipfw]
685
 
686
enabled  = false
687
filter   = sshd
688
action   = osx-ipfw
689
logpath  = /var/log/secure.log
690
maxretry = 5
691
 
692
 
693
[ssh-apf]
694
 
695
enabled = false
696
filter  = sshd
697
action  = apf[name=SSH]
698
logpath = /var/log/secure
699
maxretry = 5
700
 
701
 
702
[osx-ssh-afctl]
703
 
704
enabled  = false
705
filter   = sshd
706
action   = osx-afctl[bantime=600]
707
logpath  = /var/log/secure.log
708
maxretry = 5
709
 
710
 
711
[webmin-auth]
712
 
713
enabled = false
714
filter  = webmin-auth
715
action  = iptables-multiport[name=webmin,port="10000"]
716
logpath = /var/log/auth.log
717
 
718
 
719
# dovecot defaults to logging to the mail syslog facility
720
# but can be set by syslog_facility in the dovecot configuration.
721
[dovecot]
722
 
723
enabled = false
724
filter  = dovecot
5 - 725
action  = iptables-multiport[name=dovecot, port="pop3,pop3s,imap,imaps,submission,465,sieve", protocol=tcp]
4 - 726
logpath = /var/log/mail.log
727
 
728
 
729
[dovecot-auth]
730
 
731
enabled = false
732
filter  = dovecot
5 - 733
action  = iptables-multiport[name=dovecot-auth, port="pop3,pop3s,imap,imaps,submission,465,sieve", protocol=tcp]
4 - 734
logpath = /var/log/secure
735
 
736
 
5 - 737
[solid-pop3d]
738
 
739
enabled = false
740
filter  = solid-pop3d
741
action  = iptables-multiport[name=solid-pop3, port="pop3,pop3s", protocol=tcp]
742
logpath = /var/log/mail.log
743
 
744
 
4 - 745
[selinux-ssh]
5 - 746
enabled  = false
747
filter   = selinux-ssh
748
action   = iptables[name=SELINUX-SSH, port=ssh, protocol=tcp]
4 - 749
logpath  = /var/log/audit/audit.log
750
maxretry = 5
5 - 751
 
752
# See the IMPORTANT note in action.d/blocklist_de.conf for when to
753
# use this action
754
#
755
# Report block via blocklist.de fail2ban reporting service API
756
# See action.d/blocklist_de.conf for more information
757
[ssh-blocklist]
758
 
759
enabled  = false
760
filter   = sshd
761
action   = iptables[name=SSH, port=ssh, protocol=tcp]
762
           sendmail-whois[name=SSH, dest=you@example.com, sender=fail2ban@example.com, sendername="Fail2Ban"]
763
           blocklist_de[email="fail2ban@example.com", apikey="xxxxxx", service=%(filter)s]
764
logpath  = /var/log/sshd.log
765
maxretry = 20
766
 
767
 
768
# consider low maxretry and a long bantime
769
# nobody except your own Nagios server should ever probe nrpe
770
[nagios]
771
enabled  = false
772
filter   = nagios
773
action   = iptables[name=Nagios, port=5666, protocol=tcp]
774
           sendmail-whois[name=Nagios, dest=you@example.com, sender=fail2ban@example.com, sendername="Fail2Ban"]
775
logpath  = /var/log/messages     ; nrpe.cfg may define a different log_facility
776
maxretry = 1