Subversion Repositories configs

Rev

Rev 192 | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
192 - 1
#
2
# WARNING: heavily refactored in 0.9.0 release.  Please review and
3
#          customize settings for your setup.
4
#
5
# Changes:  in most of the cases you should not modify this
6
#           file, but provide customizations in jail.local file,
7
#           or separate .conf files under jail.d/ directory, e.g.:
8
#
9
# HOW TO ACTIVATE JAILS:
10
#
11
# YOU SHOULD NOT MODIFY THIS FILE.
12
#
13
# It will probably be overwritten or improved in a distribution update.
14
#
15
# Provide customizations in a jail.local file or a jail.d/customisation.local.
16
# For example to change the default bantime for all jails and to enable the
17
# ssh-iptables jail the following (uncommented) would appear in the .local file.
18
# See man 5 jail.conf for details.
19
#
193 - 20
# [DEFAULT]
21
# bantime = 1h
192 - 22
#
193 - 23
# [sshd]
24
# enabled = true
192 - 25
#
26
# See jail.conf(5) man page for more information
27
 
28
 
29
 
30
# Comments: use '#' for comment lines and ';' (following a space) for inline comments
31
 
32
 
33
[INCLUDES]
34
 
35
#before = paths-distro.conf
36
before = paths-fedora.conf
37
 
38
# The DEFAULT allows a global definition of the options. They can be overridden
39
# in each jail afterwards.
40
 
41
[DEFAULT]
42
 
43
#
44
# MISCELLANEOUS OPTIONS
45
#
46
 
47
# "bantime.increment" allows to use database for searching of previously banned ip's to increase a
48
# default ban time using special formula, default it is banTime * 1, 2, 4, 8, 16, 32...
49
#bantime.increment = true
50
 
51
# "bantime.rndtime" is the max number of seconds using for mixing with random time
52
# to prevent "clever" botnets calculate exact time IP can be unbanned again:
53
#bantime.rndtime =
54
 
193 - 55
# "bantime.maxtime" is the max number of seconds using the ban time can reach (doesn't grow further)
192 - 56
#bantime.maxtime =
57
 
58
# "bantime.factor" is a coefficient to calculate exponent growing of the formula or common multiplier,
59
# default value of factor is 1 and with default value of formula, the ban time
60
# grows by 1, 2, 4, 8, 16 ...
61
#bantime.factor = 1
62
 
193 - 63
# "bantime.formula" used by default to calculate next value of ban time, default value below,
192 - 64
# the same ban time growing will be reached by multipliers 1, 2, 4, 8, 16, 32...
65
#bantime.formula = ban.Time * (1<<(ban.Count if ban.Count<20 else 20)) * banFactor
66
#
67
# more aggressive example of formula has the same values only for factor "2.0 / 2.885385" :
68
#bantime.formula = ban.Time * math.exp(float(ban.Count+1)*banFactor)/math.exp(1*banFactor)
69
 
70
# "bantime.multipliers" used to calculate next value of ban time instead of formula, coresponding
71
# previously ban count and given "bantime.factor" (for multipliers default is 1);
72
# following example grows ban time by 1, 2, 4, 8, 16 ... and if last ban count greater as multipliers count,
73
# always used last multiplier (64 in example), for factor '1' and original ban time 600 - 10.6 hours
74
#bantime.multipliers = 1 2 4 8 16 32 64
75
# following example can be used for small initial ban time (bantime=60) - it grows more aggressive at begin,
76
# for bantime=60 the multipliers are minutes and equal: 1 min, 5 min, 30 min, 1 hour, 5 hour, 12 hour, 1 day, 2 day
77
#bantime.multipliers = 1 5 30 60 300 720 1440 2880
78
 
79
# "bantime.overalljails" (if true) specifies the search of IP in the database will be executed
80
# cross over all jails, if false (dafault), only current jail of the ban IP will be searched
81
#bantime.overalljails = false
82
 
83
# --------------------
84
 
85
# "ignoreself" specifies whether the local resp. own IP addresses should be ignored
86
# (default is true). Fail2ban will not ban a host which matches such addresses.
87
#ignoreself = true
88
 
89
# "ignoreip" can be a list of IP addresses, CIDR masks or DNS hosts. Fail2ban
90
# will not ban a host which matches an address in this list. Several addresses
91
# can be defined using space (and/or comma) separator.
92
#ignoreip = 127.0.0.1/8 ::1
93
 
94
# External command that will take an tagged arguments to ignore, e.g. <ip>,
95
# and return true if the IP is to be ignored. False otherwise.
96
#
97
# ignorecommand = /path/to/command <ip>
98
ignorecommand =
99
 
100
# "bantime" is the number of seconds that a host is banned.
193 - 101
bantime  = 10m
192 - 102
 
103
# A host is banned if it has generated "maxretry" during the last "findtime"
104
# seconds.
105
findtime  = 10m
106
 
107
# "maxretry" is the number of failures before a host get banned.
193 - 108
maxretry = 5
192 - 109
 
110
# "maxmatches" is the number of matches stored in ticket (resolvable via tag <matches> in actions).
111
maxmatches = %(maxretry)s
112
 
113
# "backend" specifies the backend used to get files modification.
114
# Available options are "pyinotify", "gamin", "polling", "systemd" and "auto".
115
# This option can be overridden in each jail as well.
116
#
117
# pyinotify: requires pyinotify (a file alteration monitor) to be installed.
118
#              If pyinotify is not installed, Fail2ban will use auto.
119
# gamin:     requires Gamin (a file alteration monitor) to be installed.
120
#              If Gamin is not installed, Fail2ban will use auto.
121
# polling:   uses a polling algorithm which does not require external libraries.
122
# systemd:   uses systemd python library to access the systemd journal.
123
#              Specifying "logpath" is not valid for this backend.
124
#              See "journalmatch" in the jails associated filter config
125
# auto:      will try to use the following backends, in order:
126
#              pyinotify, gamin, polling.
127
#
128
# Note: if systemd backend is chosen as the default but you enable a jail
129
#       for which logs are present only in its own log files, specify some other
130
#       backend for that jail (e.g. polling) and provide empty value for
131
#       journalmatch. See https://github.com/fail2ban/fail2ban/issues/959#issuecomment-74901200
132
backend = auto
133
 
134
# "usedns" specifies if jails should trust hostnames in logs,
135
#   warn when DNS lookups are performed, or ignore all hostnames in logs
136
#
137
# yes:   if a hostname is encountered, a DNS lookup will be performed.
138
# warn:  if a hostname is encountered, a DNS lookup will be performed,
139
#        but it will be logged as a warning.
140
# no:    if a hostname is encountered, will not be used for banning,
141
#        but it will be logged as info.
142
# raw:   use raw value (no hostname), allow use it for no-host filters/actions (example user)
143
usedns = warn
144
 
145
# "logencoding" specifies the encoding of the log files handled by the jail
146
#   This is used to decode the lines from the log file.
147
#   Typical examples:  "ascii", "utf-8"
148
#
149
#   auto:   will use the system locale setting
150
logencoding = auto
151
 
152
# "enabled" enables the jails.
153
#  By default all jails are disabled, and it should stay this way.
154
#  Enable only relevant to your setup jails in your .local or jail.d/*.conf
155
#
156
# true:  jail will be enabled and log files will get monitored for changes
157
# false: jail is not enabled
158
enabled = false
159
 
160
 
161
# "mode" defines the mode of the filter (see corresponding filter implementation for more info).
162
mode = normal
163
 
164
# "filter" defines the filter to use by the jail.
165
#  By default jails have names matching their filter name
166
#
167
filter = %(__name__)s[mode=%(mode)s]
168
 
169
 
170
#
171
# ACTIONS
172
#
173
 
174
# Some options used for actions
175
 
176
# Destination email address used solely for the interpolations in
177
# jail.{conf,local,d/*} configuration files.
178
destemail = root@localhost
179
 
180
# Sender email address used solely for some actions
181
sender = root@<fq-hostname>
182
 
183
# E-mail action. Since 0.8.1 Fail2Ban uses sendmail MTA for the
184
# mailing. Change mta configuration parameter to mail if you want to
185
# revert to conventional 'mail'.
186
mta = sendmail
187
 
188
# Default protocol
189
protocol = tcp
190
 
191
# Specify chain where jumps would need to be added in ban-actions expecting parameter chain
192
chain = <known/chain>
193
 
194
# Ports to be banned
195
# Usually should be overridden in a particular jail
196
port = 0:65535
197
 
198
# Format of user-agent https://tools.ietf.org/html/rfc7231#section-5.5.3
199
fail2ban_agent = Fail2Ban/%(fail2ban_version)s
200
 
201
#
202
# Action shortcuts. To be used to define action parameter
203
 
204
# Default banning action (e.g. iptables, iptables-new,
205
# iptables-multiport, shorewall, etc) It is used to define
206
# action_* variables. Can be overridden globally or per
207
# section within jail.local file
208
banaction = iptables-multiport
209
banaction_allports = iptables-allports
210
 
211
# The simplest action to take: ban only
193 - 212
action_ = %(banaction)s[port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
192 - 213
 
214
# ban & send an e-mail with whois report to the destemail.
193 - 215
action_mw = %(action_)s
216
            %(mta)s-whois[sender="%(sender)s", dest="%(destemail)s", protocol="%(protocol)s", chain="%(chain)s"]
192 - 217
 
218
# ban & send an e-mail with whois report and relevant log lines
219
# to the destemail.
193 - 220
action_mwl = %(action_)s
221
             %(mta)s-whois-lines[sender="%(sender)s", dest="%(destemail)s", logpath="%(logpath)s", chain="%(chain)s"]
192 - 222
 
223
# See the IMPORTANT note in action.d/xarf-login-attack for when to use this action
224
#
225
# ban & send a xarf e-mail to abuse contact of IP address and include relevant log lines
226
# to the destemail.
193 - 227
action_xarf = %(action_)s
192 - 228
             xarf-login-attack[service=%(__name__)s, sender="%(sender)s", logpath="%(logpath)s", port="%(port)s"]
229
 
230
# ban IP on CloudFlare & send an e-mail with whois report and relevant log lines
231
# to the destemail.
232
action_cf_mwl = cloudflare[cfuser="%(cfemail)s", cftoken="%(cfapikey)s"]
193 - 233
                %(mta)s-whois-lines[sender="%(sender)s", dest="%(destemail)s", logpath="%(logpath)s", chain="%(chain)s"]
192 - 234
 
235
# Report block via blocklist.de fail2ban reporting service API
236
#
237
# See the IMPORTANT note in action.d/blocklist_de.conf for when to use this action.
238
# Specify expected parameters in file action.d/blocklist_de.local or if the interpolation
239
# `action_blocklist_de` used for the action, set value of `blocklist_de_apikey`
240
# in your `jail.local` globally (section [DEFAULT]) or per specific jail section (resp. in
241
# corresponding jail.d/my-jail.local file).
242
#
193 - 243
action_blocklist_de  = blocklist_de[email="%(sender)s", service="%(__name__)s", apikey="%(blocklist_de_apikey)s", agent="%(fail2ban_agent)s"]
192 - 244
 
245
# Report ban via badips.com, and use as blacklist
246
#
247
# See BadIPsAction docstring in config/action.d/badips.py for
248
# documentation for this action.
249
#
250
# NOTE: This action relies on banaction being present on start and therefore
251
# should be last action defined for a jail.
252
#
253
action_badips = badips.py[category="%(__name__)s", banaction="%(banaction)s", agent="%(fail2ban_agent)s"]
254
#
255
# Report ban via badips.com (uses action.d/badips.conf for reporting only)
256
#
257
action_badips_report = badips[category="%(__name__)s", agent="%(fail2ban_agent)s"]
258
 
259
# Report ban via abuseipdb.com.
260
#
261
# See action.d/abuseipdb.conf for usage example and details.
262
#
263
action_abuseipdb = abuseipdb
264
 
265
# Choose default action.  To change, just override value of 'action' with the
266
# interpolation to the chosen action shortcut (e.g.  action_mw, action_mwl, etc) in jail.local
267
# globally (section [DEFAULT]) or per specific section
268
action = %(action_)s
269
 
270
 
271
#
272
# JAILS
273
#
274
 
275
#
276
# SSH servers
277
#
278
 
279
[sshd]
280
 
281
# To use more aggressive sshd modes set filter parameter "mode" in jail.local:
282
# normal (default), ddos, extra or aggressive (combines all).
283
# See "tests/files/logs/sshd" or "filter.d/sshd.conf" for usage example and details.
284
#mode   = normal
285
port    = ssh
286
logpath = %(sshd_log)s
287
backend = %(sshd_backend)s
288
 
289
 
290
[dropbear]
291
 
292
port     = ssh
293
logpath  = %(dropbear_log)s
294
backend  = %(dropbear_backend)s
295
 
296
 
297
[selinux-ssh]
298
 
299
port     = ssh
300
logpath  = %(auditd_log)s
301
 
302
 
303
#
304
# HTTP servers
305
#
306
 
307
[apache-auth]
308
 
309
port     = http,https
310
logpath  = %(apache_error_log)s
311
 
312
 
313
[apache-badbots]
314
# Ban hosts which agent identifies spammer robots crawling the web
315
# for email addresses. The mail outputs are buffered.
316
port     = http,https
317
logpath  = %(apache_access_log)s
318
bantime  = 48h
319
maxretry = 1
320
 
321
 
322
[apache-noscript]
323
 
324
port     = http,https
325
logpath  = %(apache_error_log)s
326
 
327
 
328
[apache-overflows]
329
 
330
port     = http,https
331
logpath  = %(apache_error_log)s
332
maxretry = 2
333
 
334
 
335
[apache-nohome]
336
 
337
port     = http,https
338
logpath  = %(apache_error_log)s
339
maxretry = 2
340
 
341
 
342
[apache-botsearch]
343
 
344
port     = http,https
345
logpath  = %(apache_error_log)s
346
maxretry = 2
347
 
348
 
349
[apache-fakegooglebot]
350
 
351
port     = http,https
352
logpath  = %(apache_access_log)s
353
maxretry = 1
354
ignorecommand = %(ignorecommands_dir)s/apache-fakegooglebot <ip>
355
 
356
 
357
[apache-modsecurity]
358
 
359
port     = http,https
360
logpath  = %(apache_error_log)s
361
maxretry = 2
362
 
363
 
364
[apache-shellshock]
365
 
366
port    = http,https
367
logpath = %(apache_error_log)s
368
maxretry = 1
369
 
370
 
371
[openhab-auth]
372
 
373
filter = openhab
193 - 374
banaction = %(banaction_allports)s
192 - 375
logpath = /opt/openhab/logs/request.log
376
 
377
 
378
[nginx-http-auth]
379
 
380
port    = http,https
381
logpath = %(nginx_error_log)s
382
 
383
# To use 'nginx-limit-req' jail you should have `ngx_http_limit_req_module`
384
# and define `limit_req` and `limit_req_zone` as described in nginx documentation
385
# http://nginx.org/en/docs/http/ngx_http_limit_req_module.html
386
# or for example see in 'config/filter.d/nginx-limit-req.conf'
387
[nginx-limit-req]
388
port    = http,https
389
logpath = %(nginx_error_log)s
390
 
391
[nginx-botsearch]
392
 
393
port     = http,https
394
logpath  = %(nginx_error_log)s
395
maxretry = 2
396
 
397
 
398
# Ban attackers that try to use PHP's URL-fopen() functionality
399
# through GET/POST variables. - Experimental, with more than a year
400
# of usage in production environments.
401
 
402
[php-url-fopen]
403
 
404
port    = http,https
405
logpath = %(nginx_access_log)s
406
          %(apache_access_log)s
407
 
408
 
409
[suhosin]
410
 
411
port    = http,https
412
logpath = %(suhosin_log)s
413
 
414
 
415
[lighttpd-auth]
416
# Same as above for Apache's mod_auth
417
# It catches wrong authentifications
418
port    = http,https
419
logpath = %(lighttpd_error_log)s
420
 
421
 
422
#
423
# Webmail and groupware servers
424
#
425
 
426
[roundcube-auth]
427
 
428
port     = http,https
429
logpath  = %(roundcube_errors_log)s
430
# Use following line in your jail.local if roundcube logs to journal.
431
#backend = %(syslog_backend)s
432
 
433
 
434
[openwebmail]
435
 
436
port     = http,https
437
logpath  = /var/log/openwebmail.log
438
 
439
 
440
[horde]
441
 
442
port     = http,https
443
logpath  = /var/log/horde/horde.log
444
 
445
 
446
[groupoffice]
447
 
448
port     = http,https
449
logpath  = /home/groupoffice/log/info.log
450
 
451
 
452
[sogo-auth]
453
# Monitor SOGo groupware server
454
# without proxy this would be:
455
# port    = 20000
456
port     = http,https
457
logpath  = /var/log/sogo/sogo.log
458
 
459
 
460
[tine20]
461
 
462
logpath  = /var/log/tine20/tine20.log
463
port     = http,https
464
 
465
 
466
#
467
# Web Applications
468
#
469
#
470
 
471
[drupal-auth]
472
 
473
port     = http,https
474
logpath  = %(syslog_daemon)s
475
backend  = %(syslog_backend)s
476
 
477
[guacamole]
478
 
479
port     = http,https
480
logpath  = /var/log/tomcat*/catalina.out
193 - 481
#logpath  = /var/log/guacamole.log
192 - 482
 
483
[monit]
484
#Ban clients brute-forcing the monit gui login
485
port = 2812
486
logpath  = /var/log/monit
487
           /var/log/monit.log
488
 
489
 
490
[webmin-auth]
491
 
492
port    = 10000
493
logpath = %(syslog_authpriv)s
494
backend = %(syslog_backend)s
495
 
496
 
497
[froxlor-auth]
498
 
499
port    = http,https
500
logpath  = %(syslog_authpriv)s
501
backend  = %(syslog_backend)s
502
 
503
 
504
#
505
# HTTP Proxy servers
506
#
507
#
508
 
509
[squid]
510
 
511
port     =  80,443,3128,8080
512
logpath = /var/log/squid/access.log
513
 
514
 
515
[3proxy]
516
 
517
port    = 3128
518
logpath = /var/log/3proxy.log
519
 
520
 
521
#
522
# FTP servers
523
#
524
 
525
 
526
[proftpd]
527
 
528
port     = ftp,ftp-data,ftps,ftps-data
529
logpath  = %(proftpd_log)s
530
backend  = %(proftpd_backend)s
531
 
532
 
533
[pure-ftpd]
534
 
535
port     = ftp,ftp-data,ftps,ftps-data
536
logpath  = %(pureftpd_log)s
537
backend  = %(pureftpd_backend)s
538
 
539
 
540
[gssftpd]
541
 
542
port     = ftp,ftp-data,ftps,ftps-data
543
logpath  = %(syslog_daemon)s
544
backend  = %(syslog_backend)s
545
 
546
 
547
[wuftpd]
548
 
549
port     = ftp,ftp-data,ftps,ftps-data
550
logpath  = %(wuftpd_log)s
551
backend  = %(wuftpd_backend)s
552
 
553
 
554
[vsftpd]
555
# or overwrite it in jails.local to be
556
# logpath = %(syslog_authpriv)s
557
# if you want to rely on PAM failed login attempts
558
# vsftpd's failregex should match both of those formats
559
port     = ftp,ftp-data,ftps,ftps-data
560
logpath  = %(vsftpd_log)s
561
 
562
 
563
#
564
# Mail servers
565
#
566
 
567
# ASSP SMTP Proxy Jail
568
[assp]
569
 
570
port     = smtp,465,submission
571
logpath  = /root/path/to/assp/logs/maillog.txt
572
 
573
 
574
[courier-smtp]
575
 
576
port     = smtp,465,submission
577
logpath  = %(syslog_mail)s
578
backend  = %(syslog_backend)s
579
 
580
 
581
[postfix]
582
# To use another modes set filter parameter "mode" in jail.local:
583
mode    = more
584
port    = smtp,465,submission
585
logpath = %(postfix_log)s
586
backend = %(postfix_backend)s
587
 
588
 
589
[postfix-rbl]
590
 
591
filter   = postfix[mode=rbl]
592
port     = smtp,465,submission
593
logpath  = %(postfix_log)s
594
backend  = %(postfix_backend)s
595
maxretry = 1
596
 
597
 
598
[sendmail-auth]
599
 
600
port    = submission,465,smtp
601
logpath = %(syslog_mail)s
602
backend = %(syslog_backend)s
603
 
604
 
605
[sendmail-reject]
606
# To use more aggressive modes set filter parameter "mode" in jail.local:
607
# normal (default), extra or aggressive
608
# See "tests/files/logs/sendmail-reject" or "filter.d/sendmail-reject.conf" for usage example and details.
609
#mode    = normal
610
port     = smtp,465,submission
611
logpath  = %(syslog_mail)s
612
backend  = %(syslog_backend)s
613
 
614
 
615
[qmail-rbl]
616
 
617
filter  = qmail
618
port    = smtp,465,submission
619
logpath = /service/qmail/log/main/current
620
 
621
 
622
# dovecot defaults to logging to the mail syslog facility
623
# but can be set by syslog_facility in the dovecot configuration.
624
[dovecot]
625
 
626
port    = pop3,pop3s,imap,imaps,submission,465,sieve
627
logpath = %(dovecot_log)s
628
backend = %(dovecot_backend)s
629
 
630
 
631
[sieve]
632
 
633
port   = smtp,465,submission
634
logpath = %(dovecot_log)s
635
backend = %(dovecot_backend)s
636
 
637
 
638
[solid-pop3d]
639
 
640
port    = pop3,pop3s
641
logpath = %(solidpop3d_log)s
642
 
643
 
644
[exim]
645
# see filter.d/exim.conf for further modes supported from filter:
646
#mode = normal
647
port   = smtp,465,submission
648
logpath = %(exim_main_log)s
649
 
650
 
651
[exim-spam]
652
 
653
port   = smtp,465,submission
654
logpath = %(exim_main_log)s
655
 
656
 
657
[kerio]
658
 
659
port    = imap,smtp,imaps,465
660
logpath = /opt/kerio/mailserver/store/logs/security.log
661
 
662
 
663
#
664
# Mail servers authenticators: might be used for smtp,ftp,imap servers, so
665
# all relevant ports get banned
666
#
667
 
668
[courier-auth]
669
 
670
port     = smtp,465,submission,imap,imaps,pop3,pop3s
671
logpath  = %(syslog_mail)s
672
backend  = %(syslog_backend)s
673
 
674
 
675
[postfix-sasl]
676
 
677
filter   = postfix[mode=auth]
678
port     = smtp,465,submission,imap,imaps,pop3,pop3s
679
# You might consider monitoring /var/log/mail.warn instead if you are
680
# running postfix since it would provide the same log lines at the
681
# "warn" level but overall at the smaller filesize.
682
logpath  = %(postfix_log)s
683
backend  = %(postfix_backend)s
684
 
685
 
686
[perdition]
687
 
688
port   = imap,imaps,pop3,pop3s
689
logpath = %(syslog_mail)s
690
backend = %(syslog_backend)s
691
 
692
 
693
[squirrelmail]
694
 
695
port = smtp,465,submission,imap,imap2,imaps,pop3,pop3s,http,https,socks
696
logpath = /var/lib/squirrelmail/prefs/squirrelmail_access_log
697
 
698
 
699
[cyrus-imap]
700
 
701
port   = imap,imaps
702
logpath = %(syslog_mail)s
703
backend = %(syslog_backend)s
704
 
705
 
706
[uwimap-auth]
707
 
708
port   = imap,imaps
709
logpath = %(syslog_mail)s
710
backend = %(syslog_backend)s
711
 
712
 
713
#
714
#
715
# DNS servers
716
#
717
 
718
 
719
# !!! WARNING !!!
720
#   Since UDP is connection-less protocol, spoofing of IP and imitation
721
#   of illegal actions is way too simple.  Thus enabling of this filter
722
#   might provide an easy way for implementing a DoS against a chosen
723
#   victim. See
724
#    http://nion.modprobe.de/blog/archives/690-fail2ban-+-dns-fail.html
725
#   Please DO NOT USE this jail unless you know what you are doing.
726
#
727
# IMPORTANT: see filter.d/named-refused for instructions to enable logging
728
# This jail blocks UDP traffic for DNS requests.
729
# [named-refused-udp]
730
#
731
# filter   = named-refused
732
# port     = domain,953
733
# protocol = udp
734
# logpath  = /var/log/named/security.log
735
 
736
# IMPORTANT: see filter.d/named-refused for instructions to enable logging
737
# This jail blocks TCP traffic for DNS requests.
738
 
739
[named-refused]
740
 
741
port     = domain,953
742
logpath  = /var/log/named/security.log
743
 
744
 
745
[nsd]
746
 
747
port     = 53
193 - 748
action_  = %(default/action_)s[name=%(__name__)s-tcp, protocol="tcp"]
749
           %(default/action_)s[name=%(__name__)s-udp, protocol="udp"]
192 - 750
logpath = /var/log/nsd.log
751
 
752
 
753
#
754
# Miscellaneous
755
#
756
 
757
[asterisk]
758
 
759
port     = 5060,5061
193 - 760
action_  = %(default/action_)s[name=%(__name__)s-tcp, protocol="tcp"]
761
           %(default/action_)s[name=%(__name__)s-udp, protocol="udp"]
192 - 762
logpath  = /var/log/asterisk/messages
763
maxretry = 10
764
 
765
 
766
[freeswitch]
767
 
768
port     = 5060,5061
193 - 769
action_  = %(default/action_)s[name=%(__name__)s-tcp, protocol="tcp"]
770
           %(default/action_)s[name=%(__name__)s-udp, protocol="udp"]
192 - 771
logpath  = /var/log/freeswitch.log
772
maxretry = 10
773
 
774
 
775
# enable adminlog; it will log to a file inside znc's directory by default.
776
[znc-adminlog]
777
 
778
port     = 6667
779
logpath  = /var/lib/znc/moddata/adminlog/znc.log
780
 
781
 
782
# To log wrong MySQL access attempts add to /etc/my.cnf in [mysqld] or
783
# equivalent section:
784
# log-warnings = 2
785
#
786
# for syslog (daemon facility)
787
# [mysqld_safe]
788
# syslog
789
#
790
# for own logfile
791
# [mysqld]
792
# log-error=/var/log/mysqld.log
793
[mysqld-auth]
794
 
795
port     = 3306
796
logpath  = %(mysql_log)s
797
backend  = %(mysql_backend)s
798
 
799
 
800
# Log wrong MongoDB auth (for details see filter 'filter.d/mongodb-auth.conf')
801
[mongodb-auth]
802
# change port when running with "--shardsvr" or "--configsvr" runtime operation
803
port     = 27017
804
logpath  = /var/log/mongodb/mongodb.log
805
 
806
 
807
# Jail for more extended banning of persistent abusers
808
# !!! WARNINGS !!!
809
# 1. Make sure that your loglevel specified in fail2ban.conf/.local
810
#    is not at DEBUG level -- which might then cause fail2ban to fall into
811
#    an infinite loop constantly feeding itself with non-informative lines
812
# 2. Increase dbpurgeage defined in fail2ban.conf to e.g. 648000 (7.5 days)
813
#    to maintain entries for failed logins for sufficient amount of time
814
[recidive]
815
 
816
logpath  = /var/log/fail2ban.log
817
banaction = %(banaction_allports)s
818
bantime  = 1w
819
findtime = 1d
820
 
821
 
822
# Generic filter for PAM. Has to be used with action which bans all
823
# ports such as iptables-allports, shorewall
824
 
825
[pam-generic]
826
# pam-generic filter can be customized to monitor specific subset of 'tty's
827
banaction = %(banaction_allports)s
828
logpath  = %(syslog_authpriv)s
829
backend  = %(syslog_backend)s
830
 
831
 
832
[xinetd-fail]
833
 
834
banaction = iptables-multiport-log
835
logpath   = %(syslog_daemon)s
836
backend   = %(syslog_backend)s
837
maxretry  = 2
838
 
839
 
840
# stunnel - need to set port for this
841
[stunnel]
842
 
843
logpath = /var/log/stunnel4/stunnel.log
844
 
845
 
846
[ejabberd-auth]
847
 
848
port    = 5222
849
logpath = /var/log/ejabberd/ejabberd.log
850
 
851
 
852
[counter-strike]
853
 
854
logpath = /opt/cstrike/logs/L[0-9]*.log
855
tcpport = 27030,27031,27032,27033,27034,27035,27036,27037,27038,27039
856
udpport = 1200,27000,27001,27002,27003,27004,27005,27006,27007,27008,27009,27010,27011,27012,27013,27014,27015
193 - 857
action_  = %(default/action_)s[name=%(__name__)s-tcp, port="%(tcpport)s", protocol="tcp"]
858
           %(default/action_)s[name=%(__name__)s-udp, port="%(udpport)s", protocol="udp"]
192 - 859
 
193 - 860
[softethervpn]
861
port     = 500,4500
862
protocol = udp
863
logpath  = /usr/local/vpnserver/security_log/*/sec.log
864
 
865
[gitlab]
866
port    = http,https
867
logpath = /var/log/gitlab/gitlab-rails/application.log
868
 
869
[grafana]
870
port    = http,https
871
logpath = /var/log/grafana/grafana.log
872
 
192 - 873
[bitwarden]
874
port    = http,https
875
logpath = /home/*/bwdata/logs/identity/Identity/log.txt
876
 
877
[centreon]
878
port    = http,https
879
logpath = /var/log/centreon/login.log
880
 
881
# consider low maxretry and a long bantime
882
# nobody except your own Nagios server should ever probe nrpe
883
[nagios]
884
 
885
logpath  = %(syslog_daemon)s     ; nrpe.cfg may define a different log_facility
886
backend  = %(syslog_backend)s
887
maxretry = 1
888
 
889
 
890
[oracleims]
891
# see "oracleims" filter file for configuration requirement for Oracle IMS v6 and above
892
logpath = /opt/sun/comms/messaging64/log/mail.log_current
893
banaction = %(banaction_allports)s
894
 
895
[directadmin]
896
logpath = /var/log/directadmin/login.log
897
port = 2222
898
 
899
[portsentry]
900
logpath  = /var/lib/portsentry/portsentry.history
901
maxretry = 1
902
 
903
[pass2allow-ftp]
904
# this pass2allow example allows FTP traffic after successful HTTP authentication
905
port         = ftp,ftp-data,ftps,ftps-data
906
# knocking_url variable must be overridden to some secret value in jail.local
907
knocking_url = /knocking/
908
filter       = apache-pass[knocking_url="%(knocking_url)s"]
909
# access log of the website with HTTP auth
910
logpath      = %(apache_access_log)s
911
blocktype    = RETURN
912
returntype   = DROP
913
action       = %(action_)s[blocktype=%(blocktype)s, returntype=%(returntype)s,
914
                        actionstart_on_demand=false, actionrepair_on_unban=true]
915
bantime      = 1h
916
maxretry     = 1
917
findtime     = 1
918
 
919
 
920
[murmur]
921
# AKA mumble-server
922
port     = 64738
193 - 923
action_  = %(default/action_)s[name=%(__name__)s-tcp, protocol="tcp"]
924
           %(default/action_)s[name=%(__name__)s-udp, protocol="udp"]
192 - 925
logpath  = /var/log/mumble-server/mumble-server.log
926
 
927
 
928
[screensharingd]
929
# For Mac OS Screen Sharing Service (VNC)
930
logpath  = /var/log/system.log
931
logencoding = utf-8
932
 
933
[haproxy-http-auth]
934
# HAProxy by default doesn't log to file you'll need to set it up to forward
935
# logs to a syslog server which would then write them to disk.
936
# See "haproxy-http-auth" filter for a brief cautionary note when setting
937
# maxretry and findtime.
938
logpath  = /var/log/haproxy.log
939
 
940
[slapd]
941
port    = ldap,ldaps
942
logpath = /var/log/slapd.log
943
 
944
[domino-smtp]
945
port    = smtp,ssmtp
946
logpath = /home/domino01/data/IBM_TECHNICAL_SUPPORT/console.log
947
 
948
[phpmyadmin-syslog]
949
port    = http,https
950
logpath = %(syslog_authpriv)s
951
backend = %(syslog_backend)s
952
 
953
 
954
[zoneminder]
955
# Zoneminder HTTP/HTTPS web interface auth
956
# Logs auth failures to apache2 error log
957
port    = http,https
958
logpath = %(apache_error_log)s
959
 
960
[traefik-auth]
961
# to use 'traefik-auth' filter you have to configure your Traefik instance,
962
# see `filter.d/traefik-auth.conf` for details and service example.
963
port    = http,https
964
logpath = /var/log/traefik/access.log