Subversion Repositories configs

Rev

Go to most recent revision | Details | Last modification | View Log | RSS feed

Rev Author Line No. Line
192 - 1
#
2
# WARNING: heavily refactored in 0.9.0 release.  Please review and
3
#          customize settings for your setup.
4
#
5
# Changes:  in most of the cases you should not modify this
6
#           file, but provide customizations in jail.local file,
7
#           or separate .conf files under jail.d/ directory, e.g.:
8
#
9
# HOW TO ACTIVATE JAILS:
10
#
11
# YOU SHOULD NOT MODIFY THIS FILE.
12
#
13
# It will probably be overwritten or improved in a distribution update.
14
#
15
# Provide customizations in a jail.local file or a jail.d/customisation.local.
16
# For example to change the default bantime for all jails and to enable the
17
# ssh-iptables jail the following (uncommented) would appear in the .local file.
18
# See man 5 jail.conf for details.
19
#
20
#[DEFAULT]
21
#bantime = 1d
22
 
23
#
24
#[sshd]
25
#enabled = true
26
#
27
# See jail.conf(5) man page for more information
28
 
29
 
30
 
31
# Comments: use '#' for comment lines and ';' (following a space) for inline comments
32
 
33
 
34
[INCLUDES]
35
 
36
#before = paths-distro.conf
37
before = paths-fedora.conf
38
 
39
# The DEFAULT allows a global definition of the options. They can be overridden
40
# in each jail afterwards.
41
 
42
[DEFAULT]
43
 
44
#
45
# MISCELLANEOUS OPTIONS
46
#
47
 
48
# "bantime.increment" allows to use database for searching of previously banned ip's to increase a
49
# default ban time using special formula, default it is banTime * 1, 2, 4, 8, 16, 32...
50
#bantime.increment = true
51
 
52
# "bantime.rndtime" is the max number of seconds using for mixing with random time
53
# to prevent "clever" botnets calculate exact time IP can be unbanned again:
54
#bantime.rndtime =
55
 
56
# "bantime.maxtime" is the max number of seconds using the ban time can reach (don't grows further)
57
#bantime.maxtime =
58
 
59
# "bantime.factor" is a coefficient to calculate exponent growing of the formula or common multiplier,
60
# default value of factor is 1 and with default value of formula, the ban time
61
# grows by 1, 2, 4, 8, 16 ...
62
#bantime.factor = 1
63
 
64
# "bantime.formula" used by default to calculate next value of ban time, default value bellow,
65
# the same ban time growing will be reached by multipliers 1, 2, 4, 8, 16, 32...
66
#bantime.formula = ban.Time * (1<<(ban.Count if ban.Count<20 else 20)) * banFactor
67
#
68
# more aggressive example of formula has the same values only for factor "2.0 / 2.885385" :
69
#bantime.formula = ban.Time * math.exp(float(ban.Count+1)*banFactor)/math.exp(1*banFactor)
70
 
71
# "bantime.multipliers" used to calculate next value of ban time instead of formula, coresponding
72
# previously ban count and given "bantime.factor" (for multipliers default is 1);
73
# following example grows ban time by 1, 2, 4, 8, 16 ... and if last ban count greater as multipliers count,
74
# always used last multiplier (64 in example), for factor '1' and original ban time 600 - 10.6 hours
75
#bantime.multipliers = 1 2 4 8 16 32 64
76
# following example can be used for small initial ban time (bantime=60) - it grows more aggressive at begin,
77
# for bantime=60 the multipliers are minutes and equal: 1 min, 5 min, 30 min, 1 hour, 5 hour, 12 hour, 1 day, 2 day
78
#bantime.multipliers = 1 5 30 60 300 720 1440 2880
79
 
80
# "bantime.overalljails" (if true) specifies the search of IP in the database will be executed
81
# cross over all jails, if false (dafault), only current jail of the ban IP will be searched
82
#bantime.overalljails = false
83
 
84
# --------------------
85
 
86
# "ignoreself" specifies whether the local resp. own IP addresses should be ignored
87
# (default is true). Fail2ban will not ban a host which matches such addresses.
88
#ignoreself = true
89
 
90
# "ignoreip" can be a list of IP addresses, CIDR masks or DNS hosts. Fail2ban
91
# will not ban a host which matches an address in this list. Several addresses
92
# can be defined using space (and/or comma) separator.
93
#ignoreip = 127.0.0.1/8 ::1
94
 
95
# External command that will take an tagged arguments to ignore, e.g. <ip>,
96
# and return true if the IP is to be ignored. False otherwise.
97
#
98
# ignorecommand = /path/to/command <ip>
99
ignorecommand =
100
 
101
# "bantime" is the number of seconds that a host is banned.
102
bantime  = 1d
103
 
104
# A host is banned if it has generated "maxretry" during the last "findtime"
105
# seconds.
106
findtime  = 10m
107
 
108
# "maxretry" is the number of failures before a host get banned.
109
maxretry = 3
110
 
111
# "maxmatches" is the number of matches stored in ticket (resolvable via tag <matches> in actions).
112
maxmatches = %(maxretry)s
113
 
114
# "backend" specifies the backend used to get files modification.
115
# Available options are "pyinotify", "gamin", "polling", "systemd" and "auto".
116
# This option can be overridden in each jail as well.
117
#
118
# pyinotify: requires pyinotify (a file alteration monitor) to be installed.
119
#              If pyinotify is not installed, Fail2ban will use auto.
120
# gamin:     requires Gamin (a file alteration monitor) to be installed.
121
#              If Gamin is not installed, Fail2ban will use auto.
122
# polling:   uses a polling algorithm which does not require external libraries.
123
# systemd:   uses systemd python library to access the systemd journal.
124
#              Specifying "logpath" is not valid for this backend.
125
#              See "journalmatch" in the jails associated filter config
126
# auto:      will try to use the following backends, in order:
127
#              pyinotify, gamin, polling.
128
#
129
# Note: if systemd backend is chosen as the default but you enable a jail
130
#       for which logs are present only in its own log files, specify some other
131
#       backend for that jail (e.g. polling) and provide empty value for
132
#       journalmatch. See https://github.com/fail2ban/fail2ban/issues/959#issuecomment-74901200
133
backend = auto
134
 
135
# "usedns" specifies if jails should trust hostnames in logs,
136
#   warn when DNS lookups are performed, or ignore all hostnames in logs
137
#
138
# yes:   if a hostname is encountered, a DNS lookup will be performed.
139
# warn:  if a hostname is encountered, a DNS lookup will be performed,
140
#        but it will be logged as a warning.
141
# no:    if a hostname is encountered, will not be used for banning,
142
#        but it will be logged as info.
143
# raw:   use raw value (no hostname), allow use it for no-host filters/actions (example user)
144
usedns = warn
145
 
146
# "logencoding" specifies the encoding of the log files handled by the jail
147
#   This is used to decode the lines from the log file.
148
#   Typical examples:  "ascii", "utf-8"
149
#
150
#   auto:   will use the system locale setting
151
logencoding = auto
152
 
153
# "enabled" enables the jails.
154
#  By default all jails are disabled, and it should stay this way.
155
#  Enable only relevant to your setup jails in your .local or jail.d/*.conf
156
#
157
# true:  jail will be enabled and log files will get monitored for changes
158
# false: jail is not enabled
159
enabled = false
160
 
161
 
162
# "mode" defines the mode of the filter (see corresponding filter implementation for more info).
163
mode = normal
164
 
165
# "filter" defines the filter to use by the jail.
166
#  By default jails have names matching their filter name
167
#
168
filter = %(__name__)s[mode=%(mode)s]
169
 
170
 
171
#
172
# ACTIONS
173
#
174
 
175
# Some options used for actions
176
 
177
# Destination email address used solely for the interpolations in
178
# jail.{conf,local,d/*} configuration files.
179
destemail = root@localhost
180
 
181
# Sender email address used solely for some actions
182
sender = root@<fq-hostname>
183
 
184
# E-mail action. Since 0.8.1 Fail2Ban uses sendmail MTA for the
185
# mailing. Change mta configuration parameter to mail if you want to
186
# revert to conventional 'mail'.
187
mta = sendmail
188
 
189
# Default protocol
190
protocol = tcp
191
 
192
# Specify chain where jumps would need to be added in ban-actions expecting parameter chain
193
chain = <known/chain>
194
 
195
# Ports to be banned
196
# Usually should be overridden in a particular jail
197
port = 0:65535
198
 
199
# Format of user-agent https://tools.ietf.org/html/rfc7231#section-5.5.3
200
fail2ban_agent = Fail2Ban/%(fail2ban_version)s
201
 
202
#
203
# Action shortcuts. To be used to define action parameter
204
 
205
# Default banning action (e.g. iptables, iptables-new,
206
# iptables-multiport, shorewall, etc) It is used to define
207
# action_* variables. Can be overridden globally or per
208
# section within jail.local file
209
banaction = iptables-multiport
210
banaction_allports = iptables-allports
211
 
212
# The simplest action to take: ban only
213
action_ = %(banaction)s[name=%(__name__)s, port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
214
 
215
# ban & send an e-mail with whois report to the destemail.
216
action_mw = %(banaction)s[name=%(__name__)s, port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
217
            %(mta)s-whois[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", protocol="%(protocol)s", chain="%(chain)s"]
218
 
219
# ban & send an e-mail with whois report and relevant log lines
220
# to the destemail.
221
action_mwl = %(banaction)s[name=%(__name__)s, port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
222
             %(mta)s-whois-lines[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", logpath="%(logpath)s", chain="%(chain)s"]
223
 
224
# See the IMPORTANT note in action.d/xarf-login-attack for when to use this action
225
#
226
# ban & send a xarf e-mail to abuse contact of IP address and include relevant log lines
227
# to the destemail.
228
action_xarf = %(banaction)s[name=%(__name__)s, port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
229
             xarf-login-attack[service=%(__name__)s, sender="%(sender)s", logpath="%(logpath)s", port="%(port)s"]
230
 
231
# ban IP on CloudFlare & send an e-mail with whois report and relevant log lines
232
# to the destemail.
233
action_cf_mwl = cloudflare[cfuser="%(cfemail)s", cftoken="%(cfapikey)s"]
234
                %(mta)s-whois-lines[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", logpath="%(logpath)s", chain="%(chain)s"]
235
 
236
# Report block via blocklist.de fail2ban reporting service API
237
#
238
# See the IMPORTANT note in action.d/blocklist_de.conf for when to use this action.
239
# Specify expected parameters in file action.d/blocklist_de.local or if the interpolation
240
# `action_blocklist_de` used for the action, set value of `blocklist_de_apikey`
241
# in your `jail.local` globally (section [DEFAULT]) or per specific jail section (resp. in
242
# corresponding jail.d/my-jail.local file).
243
#
244
action_blocklist_de  = blocklist_de[email="%(sender)s", service=%(filter)s, apikey="%(blocklist_de_apikey)s", agent="%(fail2ban_agent)s"]
245
 
246
# Report ban via badips.com, and use as blacklist
247
#
248
# See BadIPsAction docstring in config/action.d/badips.py for
249
# documentation for this action.
250
#
251
# NOTE: This action relies on banaction being present on start and therefore
252
# should be last action defined for a jail.
253
#
254
action_badips = badips.py[category="%(__name__)s", banaction="%(banaction)s", agent="%(fail2ban_agent)s"]
255
#
256
# Report ban via badips.com (uses action.d/badips.conf for reporting only)
257
#
258
action_badips_report = badips[category="%(__name__)s", agent="%(fail2ban_agent)s"]
259
 
260
# Report ban via abuseipdb.com.
261
#
262
# See action.d/abuseipdb.conf for usage example and details.
263
#
264
action_abuseipdb = abuseipdb
265
 
266
# Choose default action.  To change, just override value of 'action' with the
267
# interpolation to the chosen action shortcut (e.g.  action_mw, action_mwl, etc) in jail.local
268
# globally (section [DEFAULT]) or per specific section
269
action = %(action_)s
270
 
271
 
272
#
273
# JAILS
274
#
275
 
276
#
277
# SSH servers
278
#
279
 
280
[sshd]
281
 
282
# To use more aggressive sshd modes set filter parameter "mode" in jail.local:
283
# normal (default), ddos, extra or aggressive (combines all).
284
# See "tests/files/logs/sshd" or "filter.d/sshd.conf" for usage example and details.
285
#mode   = normal
286
port    = ssh
287
logpath = %(sshd_log)s
288
backend = %(sshd_backend)s
289
 
290
 
291
[dropbear]
292
 
293
port     = ssh
294
logpath  = %(dropbear_log)s
295
backend  = %(dropbear_backend)s
296
 
297
 
298
[selinux-ssh]
299
 
300
port     = ssh
301
logpath  = %(auditd_log)s
302
 
303
 
304
#
305
# HTTP servers
306
#
307
 
308
[apache-auth]
309
 
310
port     = http,https
311
logpath  = %(apache_error_log)s
312
 
313
 
314
[apache-badbots]
315
# Ban hosts which agent identifies spammer robots crawling the web
316
# for email addresses. The mail outputs are buffered.
317
port     = http,https
318
logpath  = %(apache_access_log)s
319
bantime  = 48h
320
maxretry = 1
321
 
322
 
323
[apache-noscript]
324
 
325
port     = http,https
326
logpath  = %(apache_error_log)s
327
 
328
 
329
[apache-overflows]
330
 
331
port     = http,https
332
logpath  = %(apache_error_log)s
333
maxretry = 2
334
 
335
 
336
[apache-nohome]
337
 
338
port     = http,https
339
logpath  = %(apache_error_log)s
340
maxretry = 2
341
 
342
 
343
[apache-botsearch]
344
 
345
port     = http,https
346
logpath  = %(apache_error_log)s
347
maxretry = 2
348
 
349
 
350
[apache-fakegooglebot]
351
 
352
port     = http,https
353
logpath  = %(apache_access_log)s
354
maxretry = 1
355
ignorecommand = %(ignorecommands_dir)s/apache-fakegooglebot <ip>
356
 
357
 
358
[apache-modsecurity]
359
 
360
port     = http,https
361
logpath  = %(apache_error_log)s
362
maxretry = 2
363
 
364
 
365
[apache-shellshock]
366
 
367
port    = http,https
368
logpath = %(apache_error_log)s
369
maxretry = 1
370
 
371
 
372
[openhab-auth]
373
 
374
filter = openhab
375
action = iptables-allports[name=NoAuthFailures]
376
logpath = /opt/openhab/logs/request.log
377
 
378
 
379
[nginx-http-auth]
380
 
381
port    = http,https
382
logpath = %(nginx_error_log)s
383
 
384
# To use 'nginx-limit-req' jail you should have `ngx_http_limit_req_module`
385
# and define `limit_req` and `limit_req_zone` as described in nginx documentation
386
# http://nginx.org/en/docs/http/ngx_http_limit_req_module.html
387
# or for example see in 'config/filter.d/nginx-limit-req.conf'
388
[nginx-limit-req]
389
port    = http,https
390
logpath = %(nginx_error_log)s
391
 
392
[nginx-botsearch]
393
 
394
port     = http,https
395
logpath  = %(nginx_error_log)s
396
maxretry = 2
397
 
398
 
399
# Ban attackers that try to use PHP's URL-fopen() functionality
400
# through GET/POST variables. - Experimental, with more than a year
401
# of usage in production environments.
402
 
403
[php-url-fopen]
404
 
405
port    = http,https
406
logpath = %(nginx_access_log)s
407
          %(apache_access_log)s
408
 
409
 
410
[suhosin]
411
 
412
port    = http,https
413
logpath = %(suhosin_log)s
414
 
415
 
416
[lighttpd-auth]
417
# Same as above for Apache's mod_auth
418
# It catches wrong authentifications
419
port    = http,https
420
logpath = %(lighttpd_error_log)s
421
 
422
 
423
#
424
# Webmail and groupware servers
425
#
426
 
427
[roundcube-auth]
428
 
429
port     = http,https
430
logpath  = %(roundcube_errors_log)s
431
# Use following line in your jail.local if roundcube logs to journal.
432
#backend = %(syslog_backend)s
433
 
434
 
435
[openwebmail]
436
 
437
port     = http,https
438
logpath  = /var/log/openwebmail.log
439
 
440
 
441
[horde]
442
 
443
port     = http,https
444
logpath  = /var/log/horde/horde.log
445
 
446
 
447
[groupoffice]
448
 
449
port     = http,https
450
logpath  = /home/groupoffice/log/info.log
451
 
452
 
453
[sogo-auth]
454
# Monitor SOGo groupware server
455
# without proxy this would be:
456
# port    = 20000
457
port     = http,https
458
logpath  = /var/log/sogo/sogo.log
459
 
460
 
461
[tine20]
462
 
463
logpath  = /var/log/tine20/tine20.log
464
port     = http,https
465
 
466
 
467
#
468
# Web Applications
469
#
470
#
471
 
472
[drupal-auth]
473
 
474
port     = http,https
475
logpath  = %(syslog_daemon)s
476
backend  = %(syslog_backend)s
477
 
478
[guacamole]
479
 
480
port     = http,https
481
logpath  = /var/log/tomcat*/catalina.out
482
 
483
[monit]
484
#Ban clients brute-forcing the monit gui login
485
port = 2812
486
logpath  = /var/log/monit
487
           /var/log/monit.log
488
 
489
 
490
[webmin-auth]
491
 
492
port    = 10000
493
logpath = %(syslog_authpriv)s
494
backend = %(syslog_backend)s
495
 
496
 
497
[froxlor-auth]
498
 
499
port    = http,https
500
logpath  = %(syslog_authpriv)s
501
backend  = %(syslog_backend)s
502
 
503
 
504
#
505
# HTTP Proxy servers
506
#
507
#
508
 
509
[squid]
510
 
511
port     =  80,443,3128,8080
512
logpath = /var/log/squid/access.log
513
 
514
 
515
[3proxy]
516
 
517
port    = 3128
518
logpath = /var/log/3proxy.log
519
 
520
 
521
#
522
# FTP servers
523
#
524
 
525
 
526
[proftpd]
527
 
528
port     = ftp,ftp-data,ftps,ftps-data
529
logpath  = %(proftpd_log)s
530
backend  = %(proftpd_backend)s
531
 
532
 
533
[pure-ftpd]
534
 
535
port     = ftp,ftp-data,ftps,ftps-data
536
logpath  = %(pureftpd_log)s
537
backend  = %(pureftpd_backend)s
538
 
539
 
540
[gssftpd]
541
 
542
port     = ftp,ftp-data,ftps,ftps-data
543
logpath  = %(syslog_daemon)s
544
backend  = %(syslog_backend)s
545
 
546
 
547
[wuftpd]
548
 
549
port     = ftp,ftp-data,ftps,ftps-data
550
logpath  = %(wuftpd_log)s
551
backend  = %(wuftpd_backend)s
552
 
553
 
554
[vsftpd]
555
# or overwrite it in jails.local to be
556
# logpath = %(syslog_authpriv)s
557
# if you want to rely on PAM failed login attempts
558
# vsftpd's failregex should match both of those formats
559
port     = ftp,ftp-data,ftps,ftps-data
560
logpath  = %(vsftpd_log)s
561
 
562
 
563
#
564
# Mail servers
565
#
566
 
567
# ASSP SMTP Proxy Jail
568
[assp]
569
 
570
port     = smtp,465,submission
571
logpath  = /root/path/to/assp/logs/maillog.txt
572
 
573
 
574
[courier-smtp]
575
 
576
port     = smtp,465,submission
577
logpath  = %(syslog_mail)s
578
backend  = %(syslog_backend)s
579
 
580
 
581
[postfix]
582
# To use another modes set filter parameter "mode" in jail.local:
583
mode    = more
584
port    = smtp,465,submission
585
logpath = %(postfix_log)s
586
backend = %(postfix_backend)s
587
 
588
 
589
[postfix-rbl]
590
 
591
filter   = postfix[mode=rbl]
592
port     = smtp,465,submission
593
logpath  = %(postfix_log)s
594
backend  = %(postfix_backend)s
595
maxretry = 1
596
 
597
 
598
[sendmail-auth]
599
 
600
port    = submission,465,smtp
601
logpath = %(syslog_mail)s
602
backend = %(syslog_backend)s
603
 
604
 
605
[sendmail-reject]
606
# To use more aggressive modes set filter parameter "mode" in jail.local:
607
# normal (default), extra or aggressive
608
# See "tests/files/logs/sendmail-reject" or "filter.d/sendmail-reject.conf" for usage example and details.
609
#mode    = normal
610
port     = smtp,465,submission
611
logpath  = %(syslog_mail)s
612
backend  = %(syslog_backend)s
613
 
614
 
615
[qmail-rbl]
616
 
617
filter  = qmail
618
port    = smtp,465,submission
619
logpath = /service/qmail/log/main/current
620
 
621
 
622
# dovecot defaults to logging to the mail syslog facility
623
# but can be set by syslog_facility in the dovecot configuration.
624
[dovecot]
625
 
626
port    = pop3,pop3s,imap,imaps,submission,465,sieve
627
logpath = %(dovecot_log)s
628
backend = %(dovecot_backend)s
629
 
630
 
631
[sieve]
632
 
633
port   = smtp,465,submission
634
logpath = %(dovecot_log)s
635
backend = %(dovecot_backend)s
636
 
637
 
638
[solid-pop3d]
639
 
640
port    = pop3,pop3s
641
logpath = %(solidpop3d_log)s
642
 
643
 
644
[exim]
645
# see filter.d/exim.conf for further modes supported from filter:
646
#mode = normal
647
port   = smtp,465,submission
648
logpath = %(exim_main_log)s
649
 
650
 
651
[exim-spam]
652
 
653
port   = smtp,465,submission
654
logpath = %(exim_main_log)s
655
 
656
 
657
[kerio]
658
 
659
port    = imap,smtp,imaps,465
660
logpath = /opt/kerio/mailserver/store/logs/security.log
661
 
662
 
663
#
664
# Mail servers authenticators: might be used for smtp,ftp,imap servers, so
665
# all relevant ports get banned
666
#
667
 
668
[courier-auth]
669
 
670
port     = smtp,465,submission,imap,imaps,pop3,pop3s
671
logpath  = %(syslog_mail)s
672
backend  = %(syslog_backend)s
673
 
674
 
675
[postfix-sasl]
676
 
677
filter   = postfix[mode=auth]
678
port     = smtp,465,submission,imap,imaps,pop3,pop3s
679
# You might consider monitoring /var/log/mail.warn instead if you are
680
# running postfix since it would provide the same log lines at the
681
# "warn" level but overall at the smaller filesize.
682
logpath  = %(postfix_log)s
683
backend  = %(postfix_backend)s
684
 
685
 
686
[perdition]
687
 
688
port   = imap,imaps,pop3,pop3s
689
logpath = %(syslog_mail)s
690
backend = %(syslog_backend)s
691
 
692
 
693
[squirrelmail]
694
 
695
port = smtp,465,submission,imap,imap2,imaps,pop3,pop3s,http,https,socks
696
logpath = /var/lib/squirrelmail/prefs/squirrelmail_access_log
697
 
698
 
699
[cyrus-imap]
700
 
701
port   = imap,imaps
702
logpath = %(syslog_mail)s
703
backend = %(syslog_backend)s
704
 
705
 
706
[uwimap-auth]
707
 
708
port   = imap,imaps
709
logpath = %(syslog_mail)s
710
backend = %(syslog_backend)s
711
 
712
 
713
#
714
#
715
# DNS servers
716
#
717
 
718
 
719
# !!! WARNING !!!
720
#   Since UDP is connection-less protocol, spoofing of IP and imitation
721
#   of illegal actions is way too simple.  Thus enabling of this filter
722
#   might provide an easy way for implementing a DoS against a chosen
723
#   victim. See
724
#    http://nion.modprobe.de/blog/archives/690-fail2ban-+-dns-fail.html
725
#   Please DO NOT USE this jail unless you know what you are doing.
726
#
727
# IMPORTANT: see filter.d/named-refused for instructions to enable logging
728
# This jail blocks UDP traffic for DNS requests.
729
# [named-refused-udp]
730
#
731
# filter   = named-refused
732
# port     = domain,953
733
# protocol = udp
734
# logpath  = /var/log/named/security.log
735
 
736
# IMPORTANT: see filter.d/named-refused for instructions to enable logging
737
# This jail blocks TCP traffic for DNS requests.
738
 
739
[named-refused]
740
 
741
port     = domain,953
742
logpath  = /var/log/named/security.log
743
 
744
 
745
[nsd]
746
 
747
port     = 53
748
action   = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
749
           %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
750
logpath = /var/log/nsd.log
751
 
752
 
753
#
754
# Miscellaneous
755
#
756
 
757
[asterisk]
758
 
759
port     = 5060,5061
760
action   = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
761
           %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
762
           %(mta)s-whois[name=%(__name__)s, dest="%(destemail)s"]
763
logpath  = /var/log/asterisk/messages
764
maxretry = 10
765
 
766
 
767
[freeswitch]
768
 
769
port     = 5060,5061
770
action   = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
771
           %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
772
           %(mta)s-whois[name=%(__name__)s, dest="%(destemail)s"]
773
logpath  = /var/log/freeswitch.log
774
maxretry = 10
775
 
776
 
777
# enable adminlog; it will log to a file inside znc's directory by default.
778
[znc-adminlog]
779
 
780
port     = 6667
781
logpath  = /var/lib/znc/moddata/adminlog/znc.log
782
 
783
 
784
# To log wrong MySQL access attempts add to /etc/my.cnf in [mysqld] or
785
# equivalent section:
786
# log-warnings = 2
787
#
788
# for syslog (daemon facility)
789
# [mysqld_safe]
790
# syslog
791
#
792
# for own logfile
793
# [mysqld]
794
# log-error=/var/log/mysqld.log
795
[mysqld-auth]
796
 
797
port     = 3306
798
logpath  = %(mysql_log)s
799
backend  = %(mysql_backend)s
800
 
801
 
802
# Log wrong MongoDB auth (for details see filter 'filter.d/mongodb-auth.conf')
803
[mongodb-auth]
804
# change port when running with "--shardsvr" or "--configsvr" runtime operation
805
port     = 27017
806
logpath  = /var/log/mongodb/mongodb.log
807
 
808
 
809
# Jail for more extended banning of persistent abusers
810
# !!! WARNINGS !!!
811
# 1. Make sure that your loglevel specified in fail2ban.conf/.local
812
#    is not at DEBUG level -- which might then cause fail2ban to fall into
813
#    an infinite loop constantly feeding itself with non-informative lines
814
# 2. Increase dbpurgeage defined in fail2ban.conf to e.g. 648000 (7.5 days)
815
#    to maintain entries for failed logins for sufficient amount of time
816
[recidive]
817
 
818
logpath  = /var/log/fail2ban.log
819
banaction = %(banaction_allports)s
820
bantime  = 1w
821
findtime = 1d
822
 
823
 
824
# Generic filter for PAM. Has to be used with action which bans all
825
# ports such as iptables-allports, shorewall
826
 
827
[pam-generic]
828
# pam-generic filter can be customized to monitor specific subset of 'tty's
829
banaction = %(banaction_allports)s
830
logpath  = %(syslog_authpriv)s
831
backend  = %(syslog_backend)s
832
 
833
 
834
[xinetd-fail]
835
 
836
banaction = iptables-multiport-log
837
logpath   = %(syslog_daemon)s
838
backend   = %(syslog_backend)s
839
maxretry  = 2
840
 
841
 
842
# stunnel - need to set port for this
843
[stunnel]
844
 
845
logpath = /var/log/stunnel4/stunnel.log
846
 
847
 
848
[ejabberd-auth]
849
 
850
port    = 5222
851
logpath = /var/log/ejabberd/ejabberd.log
852
 
853
 
854
[counter-strike]
855
 
856
logpath = /opt/cstrike/logs/L[0-9]*.log
857
# Firewall: http://www.cstrike-planet.com/faq/6
858
tcpport = 27030,27031,27032,27033,27034,27035,27036,27037,27038,27039
859
udpport = 1200,27000,27001,27002,27003,27004,27005,27006,27007,27008,27009,27010,27011,27012,27013,27014,27015
860
action  = %(banaction)s[name=%(__name__)s-tcp, port="%(tcpport)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
861
           %(banaction)s[name=%(__name__)s-udp, port="%(udpport)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
862
 
863
[bitwarden]
864
port    = http,https
865
logpath = /home/*/bwdata/logs/identity/Identity/log.txt
866
 
867
[centreon]
868
port    = http,https
869
logpath = /var/log/centreon/login.log
870
 
871
# consider low maxretry and a long bantime
872
# nobody except your own Nagios server should ever probe nrpe
873
[nagios]
874
 
875
logpath  = %(syslog_daemon)s     ; nrpe.cfg may define a different log_facility
876
backend  = %(syslog_backend)s
877
maxretry = 1
878
 
879
 
880
[oracleims]
881
# see "oracleims" filter file for configuration requirement for Oracle IMS v6 and above
882
logpath = /opt/sun/comms/messaging64/log/mail.log_current
883
banaction = %(banaction_allports)s
884
 
885
[directadmin]
886
logpath = /var/log/directadmin/login.log
887
port = 2222
888
 
889
[portsentry]
890
logpath  = /var/lib/portsentry/portsentry.history
891
maxretry = 1
892
 
893
[pass2allow-ftp]
894
# this pass2allow example allows FTP traffic after successful HTTP authentication
895
port         = ftp,ftp-data,ftps,ftps-data
896
# knocking_url variable must be overridden to some secret value in jail.local
897
knocking_url = /knocking/
898
filter       = apache-pass[knocking_url="%(knocking_url)s"]
899
# access log of the website with HTTP auth
900
logpath      = %(apache_access_log)s
901
blocktype    = RETURN
902
returntype   = DROP
903
action       = %(action_)s[blocktype=%(blocktype)s, returntype=%(returntype)s,
904
                        actionstart_on_demand=false, actionrepair_on_unban=true]
905
bantime      = 1h
906
maxretry     = 1
907
findtime     = 1
908
 
909
 
910
[murmur]
911
# AKA mumble-server
912
port     = 64738
913
action   = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol=tcp, chain="%(chain)s", actname=%(banaction)s-tcp]
914
           %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol=udp, chain="%(chain)s", actname=%(banaction)s-udp]
915
logpath  = /var/log/mumble-server/mumble-server.log
916
 
917
 
918
[screensharingd]
919
# For Mac OS Screen Sharing Service (VNC)
920
logpath  = /var/log/system.log
921
logencoding = utf-8
922
 
923
[haproxy-http-auth]
924
# HAProxy by default doesn't log to file you'll need to set it up to forward
925
# logs to a syslog server which would then write them to disk.
926
# See "haproxy-http-auth" filter for a brief cautionary note when setting
927
# maxretry and findtime.
928
logpath  = /var/log/haproxy.log
929
 
930
[slapd]
931
port    = ldap,ldaps
932
logpath = /var/log/slapd.log
933
 
934
[domino-smtp]
935
port    = smtp,ssmtp
936
logpath = /home/domino01/data/IBM_TECHNICAL_SUPPORT/console.log
937
 
938
[phpmyadmin-syslog]
939
port    = http,https
940
logpath = %(syslog_authpriv)s
941
backend = %(syslog_backend)s
942
 
943
 
944
[zoneminder]
945
# Zoneminder HTTP/HTTPS web interface auth
946
# Logs auth failures to apache2 error log
947
port    = http,https
948
logpath = %(apache_error_log)s
949
 
950
[traefik-auth]
951
# to use 'traefik-auth' filter you have to configure your Traefik instance,
952
# see `filter.d/traefik-auth.conf` for details and service example.
953
port    = http,https
954
logpath = /var/log/traefik/access.log