|
|
@ -1,6 +1,6 @@
|
|
|
|
diff -up fail2ban-0.9-d529151/config/jail.conf.logfiles fail2ban-0.9-d529151/config/jail.conf
|
|
|
|
diff -up fail2ban-0.9-1f1a561/config/jail.conf.logfiles fail2ban-0.9-1f1a561/config/jail.conf
|
|
|
|
--- fail2ban-0.9-d529151/config/jail.conf.logfiles 2013-07-28 03:43:54.000000000 -0600
|
|
|
|
--- fail2ban-0.9-1f1a561/config/jail.conf.logfiles 2013-09-08 05:02:35.000000000 -0600
|
|
|
|
+++ fail2ban-0.9-d529151/config/jail.conf 2013-08-08 21:23:41.785950007 -0600
|
|
|
|
+++ fail2ban-0.9-1f1a561/config/jail.conf 2013-09-24 17:01:40.264930006 -0600
|
|
|
|
@@ -152,20 +152,18 @@ action = %(action_)s
|
|
|
|
@@ -152,20 +152,18 @@ action = %(action_)s
|
|
|
|
[sshd]
|
|
|
|
[sshd]
|
|
|
|
|
|
|
|
|
|
|
@ -40,7 +40,7 @@ diff -up fail2ban-0.9-d529151/config/jail.conf.logfiles fail2ban-0.9-d529151/con
|
|
|
|
maxretry = 2
|
|
|
|
maxretry = 2
|
|
|
|
|
|
|
|
|
|
|
|
# .. custom jails
|
|
|
|
# .. custom jails
|
|
|
|
@@ -201,7 +199,7 @@ filter = sshd
|
|
|
|
@@ -194,7 +192,7 @@ filter = sshd
|
|
|
|
action = hostsdeny[daemon_list=sshd]
|
|
|
|
action = hostsdeny[daemon_list=sshd]
|
|
|
|
sendmail-whois[name=SSH, dest=you@example.com]
|
|
|
|
sendmail-whois[name=SSH, dest=you@example.com]
|
|
|
|
ignoreregex = for myuser from
|
|
|
|
ignoreregex = for myuser from
|
|
|
@ -49,7 +49,7 @@ diff -up fail2ban-0.9-d529151/config/jail.conf.logfiles fail2ban-0.9-d529151/con
|
|
|
|
|
|
|
|
|
|
|
|
# Here we use blackhole routes for not requiring any additional kernel support
|
|
|
|
# Here we use blackhole routes for not requiring any additional kernel support
|
|
|
|
# to store large volumes of banned IPs
|
|
|
|
# to store large volumes of banned IPs
|
|
|
|
@@ -210,7 +208,7 @@ logpath = /var/log/sshd.log
|
|
|
|
@@ -203,7 +201,7 @@ logpath = /var/log/sshd.log
|
|
|
|
|
|
|
|
|
|
|
|
filter = sshd
|
|
|
|
filter = sshd
|
|
|
|
action = route
|
|
|
|
action = route
|
|
|
@ -58,7 +58,7 @@ diff -up fail2ban-0.9-d529151/config/jail.conf.logfiles fail2ban-0.9-d529151/con
|
|
|
|
|
|
|
|
|
|
|
|
# Here we use a combination of Netfilter/Iptables and IPsets
|
|
|
|
# Here we use a combination of Netfilter/Iptables and IPsets
|
|
|
|
# for storing large volumes of banned IPs
|
|
|
|
# for storing large volumes of banned IPs
|
|
|
|
@@ -221,13 +219,13 @@ logpath = /var/log/sshd.log
|
|
|
|
@@ -214,13 +212,13 @@ logpath = /var/log/sshd.log
|
|
|
|
|
|
|
|
|
|
|
|
filter = sshd
|
|
|
|
filter = sshd
|
|
|
|
action = iptables-ipset-proto4[name=SSH, port=ssh, protocol=tcp]
|
|
|
|
action = iptables-ipset-proto4[name=SSH, port=ssh, protocol=tcp]
|
|
|
@ -74,25 +74,33 @@ diff -up fail2ban-0.9-d529151/config/jail.conf.logfiles fail2ban-0.9-d529151/con
|
|
|
|
|
|
|
|
|
|
|
|
# This jail uses ipfw, the standard firewall on FreeBSD. The "ignoreip"
|
|
|
|
# This jail uses ipfw, the standard firewall on FreeBSD. The "ignoreip"
|
|
|
|
# option is overridden in this jail. Moreover, the action "mail-whois" defines
|
|
|
|
# option is overridden in this jail. Moreover, the action "mail-whois" defines
|
|
|
|
@@ -238,7 +236,7 @@ logpath = /var/log/sshd.log
|
|
|
|
@@ -231,7 +229,7 @@ logpath = /var/log/sshd.log
|
|
|
|
filter = sshd
|
|
|
|
filter = sshd
|
|
|
|
action = ipfw[localhost=192.168.0.1]
|
|
|
|
action = ipfw[localhost=192.168.0.1]
|
|
|
|
sendmail-whois[name="SSH,IPFW", dest=you@example.com]
|
|
|
|
sendmail-whois[name="SSH,IPFW", dest=you@example.com]
|
|
|
|
-logpath = /var/log/auth.log
|
|
|
|
-logpath = /var/log/auth.log
|
|
|
|
+logpath = /var/log/secure
|
|
|
|
+logpath = /var/log/secure
|
|
|
|
ignoreip = 168.192.0.1
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# bsd-ipfw is ipfw used by BSD. It uses ipfw tables.
|
|
|
|
# bsd-ipfw is ipfw used by BSD. It uses ipfw tables.
|
|
|
|
@@ -250,7 +248,7 @@ ignoreip = 168.192.0.1
|
|
|
|
# table number must be unique.
|
|
|
|
[ssh-bsd-ipfw]
|
|
|
|
@@ -243,14 +241,14 @@ logpath = /var/log/auth.log
|
|
|
|
|
|
|
|
|
|
|
|
filter = sshd
|
|
|
|
filter = sshd
|
|
|
|
action = bsd-ipfw[port=ssh,table=1]
|
|
|
|
action = bsd-ipfw[port=ssh,table=1]
|
|
|
|
-logpath = /var/log/auth.log
|
|
|
|
-logpath = /var/log/auth.log
|
|
|
|
+logpath = /var/log/secure
|
|
|
|
+logpath = /var/log/secure
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# PF is a BSD based firewall
|
|
|
|
|
|
|
|
[ssh-pf]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
filter = sshd
|
|
|
|
|
|
|
|
action = pf
|
|
|
|
|
|
|
|
-logpath = /var/log/sshd.log
|
|
|
|
|
|
|
|
+logpath = /var/log/secure
|
|
|
|
|
|
|
|
maxretry= 5
|
|
|
|
|
|
|
|
|
|
|
|
#
|
|
|
|
#
|
|
|
|
# HTTP servers
|
|
|
|
@@ -260,7 +258,7 @@ maxretry= 5
|
|
|
|
@@ -259,7 +257,7 @@ logpath = /var/log/auth.log
|
|
|
|
|
|
|
|
[apache-auth]
|
|
|
|
[apache-auth]
|
|
|
|
|
|
|
|
|
|
|
|
port = http,https
|
|
|
|
port = http,https
|
|
|
@ -101,7 +109,7 @@ diff -up fail2ban-0.9-d529151/config/jail.conf.logfiles fail2ban-0.9-d529151/con
|
|
|
|
|
|
|
|
|
|
|
|
# Ban hosts which agent identifies spammer robots crawling the web
|
|
|
|
# Ban hosts which agent identifies spammer robots crawling the web
|
|
|
|
# for email addresses. The mail outputs are buffered.
|
|
|
|
# for email addresses. The mail outputs are buffered.
|
|
|
|
@@ -267,21 +265,20 @@ logpath = /var/log/apache*/*error.log
|
|
|
|
@@ -268,21 +266,20 @@ logpath = /var/log/apache*/*error.log
|
|
|
|
[apache-badbots]
|
|
|
|
[apache-badbots]
|
|
|
|
|
|
|
|
|
|
|
|
port = http,https
|
|
|
|
port = http,https
|
|
|
@ -126,16 +134,16 @@ diff -up fail2ban-0.9-d529151/config/jail.conf.logfiles fail2ban-0.9-d529151/con
|
|
|
|
maxretry = 2
|
|
|
|
maxretry = 2
|
|
|
|
|
|
|
|
|
|
|
|
# Ban attackers that try to use PHP's URL-fopen() functionality
|
|
|
|
# Ban attackers that try to use PHP's URL-fopen() functionality
|
|
|
|
@@ -291,7 +288,7 @@ maxretry = 2
|
|
|
|
@@ -292,7 +289,7 @@ maxretry = 2
|
|
|
|
[php-url-fopen]
|
|
|
|
[php-url-fopen]
|
|
|
|
|
|
|
|
|
|
|
|
port = http,https
|
|
|
|
port = http,https
|
|
|
|
-logpath = /var/www/*/logs/access_log
|
|
|
|
-logpath = /var/www/*/logs/access_log
|
|
|
|
+logpath = /var/log/httpd/*access_log
|
|
|
|
+logpath = /var/log/httpd/*access_log
|
|
|
|
|
|
|
|
|
|
|
|
# A simple PHP-fastcgi jail which works with lighttpd.
|
|
|
|
[suhosin]
|
|
|
|
# If you run a lighttpd server, then you probably will
|
|
|
|
|
|
|
|
@@ -330,7 +327,7 @@ logpath = /var/log/sogo/sogo.log
|
|
|
|
@@ -325,7 +322,7 @@ logpath = /var/log/sogo/sogo.log
|
|
|
|
|
|
|
|
|
|
|
|
filter = apache-auth
|
|
|
|
filter = apache-auth
|
|
|
|
action = hostsdeny
|
|
|
|
action = hostsdeny
|
|
|
@ -143,7 +151,7 @@ diff -up fail2ban-0.9-d529151/config/jail.conf.logfiles fail2ban-0.9-d529151/con
|
|
|
|
+logpath = /var/log/httpd/*error_log
|
|
|
|
+logpath = /var/log/httpd/*error_log
|
|
|
|
maxretry = 6
|
|
|
|
maxretry = 6
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
[3proxy]
|
|
|
|
@@ -347,7 +344,7 @@ logpath = /var/log/proftpd/proftpd.log
|
|
|
|
@@ -347,7 +344,7 @@ logpath = /var/log/proftpd/proftpd.log
|
|
|
|
[pure-ftpd]
|
|
|
|
[pure-ftpd]
|
|
|
|
|
|
|
|
|
|
|
@ -162,7 +170,7 @@ diff -up fail2ban-0.9-d529151/config/jail.conf.logfiles fail2ban-0.9-d529151/con
|
|
|
|
# if you want to rely on PAM failed login attempts
|
|
|
|
# if you want to rely on PAM failed login attempts
|
|
|
|
# vsftpd's failregex should match both of those formats
|
|
|
|
# vsftpd's failregex should match both of those formats
|
|
|
|
|
|
|
|
|
|
|
|
@@ -384,12 +381,12 @@ maxretry = 6
|
|
|
|
@@ -390,12 +387,12 @@ logpath = /root/path/to/assp/logs/maill
|
|
|
|
[courier-smtp]
|
|
|
|
[courier-smtp]
|
|
|
|
|
|
|
|
|
|
|
|
port = smtp,ssmtp,submission
|
|
|
|
port = smtp,ssmtp,submission
|
|
|
@ -177,7 +185,7 @@ diff -up fail2ban-0.9-d529151/config/jail.conf.logfiles fail2ban-0.9-d529151/con
|
|
|
|
|
|
|
|
|
|
|
|
# The hosts.deny path can be defined with the "file" argument if it is
|
|
|
|
# The hosts.deny path can be defined with the "file" argument if it is
|
|
|
|
# not in /etc.
|
|
|
|
# not in /etc.
|
|
|
|
@@ -410,7 +407,7 @@ bantime = 300
|
|
|
|
@@ -427,7 +424,7 @@ logpath = /var/log/exim/mainlog
|
|
|
|
[courier-auth]
|
|
|
|
[courier-auth]
|
|
|
|
|
|
|
|
|
|
|
|
port = smtp,ssmtp,submission,imap2,imap3,imaps,pop3,pop3s
|
|
|
|
port = smtp,ssmtp,submission,imap2,imap3,imaps,pop3,pop3s
|
|
|
@ -186,7 +194,7 @@ diff -up fail2ban-0.9-d529151/config/jail.conf.logfiles fail2ban-0.9-d529151/con
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
[sasl]
|
|
|
|
[sasl]
|
|
|
|
@@ -419,12 +416,12 @@ port = smtp,ssmtp,submission,imap2,i
|
|
|
|
@@ -436,12 +433,12 @@ port = smtp,ssmtp,submission,imap2,i
|
|
|
|
# You might consider monitoring /var/log/mail.warn instead if you are
|
|
|
|
# You might consider monitoring /var/log/mail.warn instead if you are
|
|
|
|
# running postfix since it would provide the same log lines at the
|
|
|
|
# running postfix since it would provide the same log lines at the
|
|
|
|
# "warn" level but overall at the smaller filesize.
|
|
|
|
# "warn" level but overall at the smaller filesize.
|
|
|
@ -199,14 +207,5 @@ diff -up fail2ban-0.9-d529151/config/jail.conf.logfiles fail2ban-0.9-d529151/con
|
|
|
|
-logpath = /var/log/mail.log
|
|
|
|
-logpath = /var/log/mail.log
|
|
|
|
+logpath = /var/log/maillog
|
|
|
|
+logpath = /var/log/maillog
|
|
|
|
|
|
|
|
|
|
|
|
#
|
|
|
|
[perdition]
|
|
|
|
# DNS servers
|
|
|
|
|
|
|
|
@@ -519,7 +516,7 @@ maxretry = 5
|
|
|
|
|
|
|
|
enabled=false
|
|
|
|
|
|
|
|
filter = sshd
|
|
|
|
|
|
|
|
action = pf
|
|
|
|
|
|
|
|
-logpath = /var/log/sshd.log
|
|
|
|
|
|
|
|
+logpath = /var/log/secure
|
|
|
|
|
|
|
|
maxretry=5
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
[3proxy]
|
|
|
|
|
|
|
|