You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
111 lines
3.7 KiB
111 lines
3.7 KiB
--- fail2ban-0.8.4/config/jail.conf.bak 2011-04-09 17:53:27.022210040 +0200
|
|
+++ fail2ban-0.8.4/config/jail.conf 2011-04-09 18:22:35.075335264 +0200
|
|
@@ -45,7 +45,7 @@
|
|
enabled = true
|
|
filter = sshd
|
|
action = iptables[name=SSH, port=ssh, protocol=tcp]
|
|
- sendmail-whois[name=SSH, dest=root, sender=fail2ban@mail.com]
|
|
+ sendmail-whois[name=SSH, dest=root, sender=fail2ban@example.com]
|
|
logpath = /var/log/secure
|
|
maxretry = 5
|
|
|
|
@@ -54,7 +54,7 @@
|
|
enabled = false
|
|
filter = proftpd
|
|
action = iptables[name=ProFTPD, port=ftp, protocol=tcp]
|
|
- sendmail-whois[name=ProFTPD, dest=you@mail.com]
|
|
+ sendmail-whois[name=ProFTPD, dest=you@example.com]
|
|
logpath = /var/log/proftpd/proftpd.log
|
|
maxretry = 6
|
|
|
|
@@ -66,7 +66,7 @@
|
|
filter = sasl
|
|
backend = polling
|
|
action = iptables[name=sasl, port=smtp, protocol=tcp]
|
|
- sendmail-whois[name=sasl, dest=you@mail.com]
|
|
+ sendmail-whois[name=sasl, dest=you@example.com]
|
|
logpath = /var/log/mail.log
|
|
|
|
# Here we use TCP-Wrappers instead of Netfilter/Iptables. "ignoreregex" is
|
|
@@ -77,7 +77,7 @@
|
|
enabled = false
|
|
filter = sshd
|
|
action = hostsdeny
|
|
- sendmail-whois[name=SSH, dest=you@mail.com]
|
|
+ sendmail-whois[name=SSH, dest=you@example.com]
|
|
ignoreregex = for myuser from
|
|
logpath = /var/log/sshd.log
|
|
|
|
@@ -101,7 +101,7 @@
|
|
enabled = false
|
|
filter = postfix
|
|
action = hostsdeny[file=/not/a/standard/path/hosts.deny]
|
|
- sendmail[name=Postfix, dest=you@mail.com]
|
|
+ sendmail[name=Postfix, dest=you@example.com]
|
|
logpath = /var/log/postfix.log
|
|
bantime = 300
|
|
|
|
@@ -112,7 +112,7 @@
|
|
|
|
enabled = false
|
|
filter = vsftpd
|
|
-action = sendmail-whois[name=VSFTPD, dest=you@mail.com]
|
|
+action = sendmail-whois[name=VSFTPD, dest=you@example.com]
|
|
logpath = /var/log/vsftpd.log
|
|
maxretry = 5
|
|
bantime = 1800
|
|
@@ -124,7 +124,7 @@
|
|
enabled = false
|
|
filter = vsftpd
|
|
action = iptables[name=VSFTPD, port=ftp, protocol=tcp]
|
|
- sendmail-whois[name=VSFTPD, dest=you@mail.com]
|
|
+ sendmail-whois[name=VSFTPD, dest=you@example.com]
|
|
logpath = /var/log/vsftpd.log
|
|
maxretry = 5
|
|
bantime = 1800
|
|
@@ -137,7 +137,7 @@
|
|
enabled = false
|
|
filter = apache-badbots
|
|
action = iptables-multiport[name=BadBots, port="http,https"]
|
|
- sendmail-buffered[name=BadBots, lines=5, dest=you@mail.com]
|
|
+ sendmail-buffered[name=BadBots, lines=5, dest=you@example.com]
|
|
logpath = /var/www/*/logs/access_log
|
|
bantime = 172800
|
|
maxretry = 1
|
|
@@ -149,7 +149,7 @@
|
|
enabled = false
|
|
filter = apache-noscript
|
|
action = shorewall
|
|
- sendmail[name=Postfix, dest=you@mail.com]
|
|
+ sendmail[name=Postfix, dest=you@example.com]
|
|
logpath = /var/log/apache2/error_log
|
|
|
|
# Ban attackers that try to use PHP's URL-fopen() functionality
|
|
@@ -190,7 +190,7 @@
|
|
enabled = false
|
|
filter = sshd
|
|
action = ipfw[localhost=192.168.0.1]
|
|
- sendmail-whois[name="SSH,IPFW", dest=you@mail.com]
|
|
+ sendmail-whois[name="SSH,IPFW", dest=you@example.com]
|
|
logpath = /var/log/auth.log
|
|
ignoreip = 168.192.0.1
|
|
|
|
@@ -216,7 +216,7 @@
|
|
enabled = false
|
|
filter = named-refused
|
|
action = iptables-multiport[name=Named, port="domain,953", protocol=udp]
|
|
- sendmail-whois[name=Named, dest=you@mail.com]
|
|
+ sendmail-whois[name=Named, dest=you@example.com]
|
|
logpath = /var/log/named/security.log
|
|
ignoreip = 168.192.0.1
|
|
|
|
@@ -227,7 +227,7 @@
|
|
enabled = false
|
|
filter = named-refused
|
|
action = iptables-multiport[name=Named, port="domain,953", protocol=tcp]
|
|
- sendmail-whois[name=Named, dest=you@mail.com]
|
|
+ sendmail-whois[name=Named, dest=you@example.com]
|
|
logpath = /var/log/named/security.log
|
|
ignoreip = 168.192.0.1
|
|
|