--- fail2ban-0.8.4/config/jail.conf.bak 2011-04-09 17:53:27.022210040 +0200 +++ fail2ban-0.8.4/config/jail.conf 2011-04-09 18:22:35.075335264 +0200 @@ -45,7 +45,7 @@ enabled = true filter = sshd action = iptables[name=SSH, port=ssh, protocol=tcp] - sendmail-whois[name=SSH, dest=root, sender=fail2ban@mail.com] + sendmail-whois[name=SSH, dest=root, sender=fail2ban@example.com] logpath = /var/log/secure maxretry = 5 @@ -54,7 +54,7 @@ enabled = false filter = proftpd action = iptables[name=ProFTPD, port=ftp, protocol=tcp] - sendmail-whois[name=ProFTPD, dest=you@mail.com] + sendmail-whois[name=ProFTPD, dest=you@example.com] logpath = /var/log/proftpd/proftpd.log maxretry = 6 @@ -66,7 +66,7 @@ filter = sasl backend = polling action = iptables[name=sasl, port=smtp, protocol=tcp] - sendmail-whois[name=sasl, dest=you@mail.com] + sendmail-whois[name=sasl, dest=you@example.com] logpath = /var/log/mail.log # Here we use TCP-Wrappers instead of Netfilter/Iptables. "ignoreregex" is @@ -77,7 +77,7 @@ enabled = false filter = sshd action = hostsdeny - sendmail-whois[name=SSH, dest=you@mail.com] + sendmail-whois[name=SSH, dest=you@example.com] ignoreregex = for myuser from logpath = /var/log/sshd.log @@ -101,7 +101,7 @@ enabled = false filter = postfix action = hostsdeny[file=/not/a/standard/path/hosts.deny] - sendmail[name=Postfix, dest=you@mail.com] + sendmail[name=Postfix, dest=you@example.com] logpath = /var/log/postfix.log bantime = 300 @@ -112,7 +112,7 @@ enabled = false filter = vsftpd -action = sendmail-whois[name=VSFTPD, dest=you@mail.com] +action = sendmail-whois[name=VSFTPD, dest=you@example.com] logpath = /var/log/vsftpd.log maxretry = 5 bantime = 1800 @@ -124,7 +124,7 @@ enabled = false filter = vsftpd action = iptables[name=VSFTPD, port=ftp, protocol=tcp] - sendmail-whois[name=VSFTPD, dest=you@mail.com] + sendmail-whois[name=VSFTPD, dest=you@example.com] logpath = /var/log/vsftpd.log maxretry = 5 bantime = 1800 @@ -137,7 +137,7 @@ enabled = false filter = apache-badbots action = iptables-multiport[name=BadBots, port="http,https"] - sendmail-buffered[name=BadBots, lines=5, dest=you@mail.com] + sendmail-buffered[name=BadBots, lines=5, dest=you@example.com] logpath = /var/www/*/logs/access_log bantime = 172800 maxretry = 1 @@ -149,7 +149,7 @@ enabled = false filter = apache-noscript action = shorewall - sendmail[name=Postfix, dest=you@mail.com] + sendmail[name=Postfix, dest=you@example.com] logpath = /var/log/apache2/error_log # Ban attackers that try to use PHP's URL-fopen() functionality @@ -190,7 +190,7 @@ enabled = false filter = sshd action = ipfw[localhost=192.168.0.1] - sendmail-whois[name="SSH,IPFW", dest=you@mail.com] + sendmail-whois[name="SSH,IPFW", dest=you@example.com] logpath = /var/log/auth.log ignoreip = 168.192.0.1 @@ -216,7 +216,7 @@ enabled = false filter = named-refused action = iptables-multiport[name=Named, port="domain,953", protocol=udp] - sendmail-whois[name=Named, dest=you@mail.com] + sendmail-whois[name=Named, dest=you@example.com] logpath = /var/log/named/security.log ignoreip = 168.192.0.1 @@ -227,7 +227,7 @@ enabled = false filter = named-refused action = iptables-multiport[name=Named, port="domain,953", protocol=tcp] - sendmail-whois[name=Named, dest=you@mail.com] + sendmail-whois[name=Named, dest=you@example.com] logpath = /var/log/named/security.log ignoreip = 168.192.0.1