2013-01-03 17:46:31 +00:00
|
|
|
# Fail2Ban configuration file
|
|
|
|
#
|
|
|
|
# Author: Michael Gebetsroither
|
|
|
|
#
|
|
|
|
# This is for blocking whole hosts through blackhole routes.
|
|
|
|
#
|
|
|
|
# PRO:
|
|
|
|
# - Works on all kernel versions and as no compatibility problems (back to debian lenny and WAY further).
|
|
|
|
# - It's FAST for very large numbers of blocked ips.
|
|
|
|
# - It's FAST because it Blocks traffic before it enters common iptables chains used for filtering.
|
|
|
|
# - It's per host, ideal as action against ssh password bruteforcing to block further attack attempts.
|
|
|
|
# - No additional software required beside iproute/iproute2
|
|
|
|
#
|
|
|
|
# CON:
|
|
|
|
# - Blocking is per IP and NOT per service, but ideal as action against ssh password bruteforcing hosts
|
|
|
|
|
|
|
|
[Definition]
|
2013-05-05 05:43:18 +00:00
|
|
|
actionban = ip route add <blocktype> <ip>
|
|
|
|
actionunban = ip route del <blocktype> <ip>
|
2015-10-10 01:16:36 +00:00
|
|
|
actioncheck =
|
|
|
|
actionstart =
|
|
|
|
actionstop =
|
2013-02-17 01:37:34 +00:00
|
|
|
|
2013-05-24 15:15:46 +00:00
|
|
|
[Init]
|
|
|
|
|
2013-05-05 05:43:18 +00:00
|
|
|
# Option: blocktype
|
|
|
|
# Note: Type can be blackhole, unreachable and prohibit. Unreachable and prohibit correspond to the ICMP reject messages.
|
|
|
|
# Values: STRING
|
2013-05-07 21:31:31 +00:00
|
|
|
blocktype = unreachable
|