2006-09-29 04:05:50 +00:00
|
|
|
# Fail2Ban configuration file.
|
|
|
|
#
|
|
|
|
# This file was composed for Debian systems from the original one
|
|
|
|
# provided now under /usr/share/doc/fail2ban/examples/jail.conf
|
|
|
|
# for additional examples.
|
|
|
|
#
|
2006-11-06 14:23:58 +00:00
|
|
|
# To avoid merges during upgrades DO NOT MODIFY THIS FILE
|
2006-09-29 04:05:50 +00:00
|
|
|
# and rather provide your changes in /etc/fail2ban/jail.local
|
|
|
|
#
|
|
|
|
# Author: Yaroslav O. Halchenko <debian@onerussian.com>
|
|
|
|
#
|
|
|
|
# $Revision: 281 $
|
|
|
|
#
|
|
|
|
|
|
|
|
# The DEFAULT allows a global definition of the options. They can be override
|
|
|
|
# in each jail afterwards.
|
|
|
|
|
|
|
|
[DEFAULT]
|
|
|
|
|
|
|
|
# "ignoreip" can be an IP address, a CIDR mask or a DNS host
|
|
|
|
ignoreip = 127.0.0.1
|
|
|
|
bantime = 600
|
|
|
|
maxretry = 3
|
|
|
|
|
2006-11-02 02:04:57 +00:00
|
|
|
# "backend" specifies the backend used to get files modification. Available
|
|
|
|
# options are "gamin", "polling" and "auto".
|
|
|
|
# yoh: For some reason Debian shipped python-gamin didn't work as expected
|
|
|
|
# This issue left ToDo, so polling is default backend for now
|
|
|
|
backend = polling
|
|
|
|
|
|
|
|
#
|
2006-09-29 04:05:50 +00:00
|
|
|
# Destination email address used solely for the interpolations in
|
|
|
|
# jail.{conf,local} configuration files.
|
|
|
|
destemail = root@localhost
|
|
|
|
|
2006-10-30 03:32:29 +00:00
|
|
|
# Default action to take: ban only
|
|
|
|
action = iptables[name=%(__name__)s, port=%(port)s]
|
|
|
|
|
2006-12-10 23:40:04 +00:00
|
|
|
# Following actions can be chosen as an alternatives to the above action.
|
|
|
|
# To activate, just copy/paste+uncomment chosen 2 (excluding comments) lines
|
|
|
|
# into jail.local
|
2006-09-29 04:05:50 +00:00
|
|
|
|
2006-12-10 23:40:04 +00:00
|
|
|
# Default action to take: ban & send an e-mail with whois report
|
|
|
|
# to the destemail.
|
|
|
|
# action = iptables[name=%(__name__)s, port=%(port)s]
|
|
|
|
# mail-whois[name=%(__name__)s, dest=%(destemail)s]
|
|
|
|
|
|
|
|
# Default action to take: ban & send an e-mail with whois report
|
|
|
|
# and relevant log lines to the destemail.
|
|
|
|
# action = iptables[name=%(__name__)s, port=%(port)s]
|
|
|
|
# mail-whois-lines[name=%(__name__)s, dest=%(destemail)s, logpath=%(logpath)s]
|
|
|
|
|
2006-11-06 14:23:58 +00:00
|
|
|
# Next jails corresponds to the standard configuration in Fail2ban 0.6
|
2006-12-10 23:40:04 +00:00
|
|
|
# which was shipped in Debian. Please enable any defined here jail by including
|
2006-09-29 04:05:50 +00:00
|
|
|
#
|
|
|
|
# [SECTION_NAME]
|
|
|
|
# enabled = true
|
|
|
|
#
|
2006-12-10 23:40:04 +00:00
|
|
|
# in /etc/fail2ban/jail.local.
|
2006-09-29 04:05:50 +00:00
|
|
|
#
|
2006-09-29 04:21:16 +00:00
|
|
|
|
2006-09-29 13:22:23 +00:00
|
|
|
[ssh]
|
2006-09-29 04:05:50 +00:00
|
|
|
|
|
|
|
enabled = true
|
|
|
|
port = ssh
|
|
|
|
filter = sshd
|
|
|
|
logpath = /var/log/auth.log
|
|
|
|
maxretry = 6
|
|
|
|
|
2006-12-28 07:28:53 +00:00
|
|
|
|
|
|
|
[ssh-ddos]
|
|
|
|
|
|
|
|
enabled = false
|
|
|
|
port = ssh
|
|
|
|
filter = sshd-ddos
|
|
|
|
logpath = /var/log/auth.log
|
|
|
|
maxretry = 6
|
|
|
|
|
2006-09-29 04:21:16 +00:00
|
|
|
#
|
|
|
|
# HTTP servers
|
|
|
|
#
|
|
|
|
|
2006-09-29 13:22:23 +00:00
|
|
|
[apache]
|
2006-09-29 04:05:50 +00:00
|
|
|
|
|
|
|
enabled = false
|
|
|
|
port = http
|
|
|
|
filter = apache-auth
|
|
|
|
logpath = /var/log/apache*/*access.log
|
|
|
|
maxretry = 6
|
|
|
|
|
2006-10-18 05:15:53 +00:00
|
|
|
|
2006-10-30 03:32:29 +00:00
|
|
|
[apache-noscript]
|
|
|
|
|
|
|
|
enabled = false
|
|
|
|
port = http
|
|
|
|
filter = apache-noscript
|
|
|
|
logpath = /var/log/apache*/*error.log
|
|
|
|
maxretry = 6
|
|
|
|
|
2006-09-29 04:21:16 +00:00
|
|
|
#
|
|
|
|
# FTP servers
|
|
|
|
#
|
2006-09-29 04:05:50 +00:00
|
|
|
|
2006-09-29 13:22:23 +00:00
|
|
|
[vsftpd]
|
2006-09-29 04:05:50 +00:00
|
|
|
|
|
|
|
enabled = false
|
2006-09-29 04:21:16 +00:00
|
|
|
port = ftp
|
|
|
|
filter = vsftpd
|
2006-12-21 16:54:39 +00:00
|
|
|
logpath = /var/log/vsftpd.log
|
2006-12-22 04:54:14 +00:00
|
|
|
# or overwrite it in jails.local to be
|
|
|
|
# logpath = /var/log/auth.log
|
|
|
|
# if you want to rely on PAM failed login attempts
|
|
|
|
# vsftpd's failregex should match both of those formats
|
2006-09-29 04:21:16 +00:00
|
|
|
maxretry = 6
|
2006-09-29 04:05:50 +00:00
|
|
|
|
|
|
|
|
2006-09-29 13:22:23 +00:00
|
|
|
[proftpd]
|
2006-09-29 04:05:50 +00:00
|
|
|
|
|
|
|
enabled = false
|
|
|
|
port = ftp
|
2006-09-29 04:21:16 +00:00
|
|
|
filter = proftpd
|
|
|
|
logpath = /var/log/proftpd/proftpd.log
|
2006-09-29 04:05:50 +00:00
|
|
|
maxretry = 6
|
|
|
|
|
2006-10-18 05:15:53 +00:00
|
|
|
|
|
|
|
[wuftpd]
|
|
|
|
|
|
|
|
enabled = false
|
|
|
|
port = ftp
|
|
|
|
filter = wuftpd
|
|
|
|
logpath = /var/log/auth.log
|
|
|
|
maxretry = 6
|
|
|
|
|
|
|
|
|
2006-09-29 04:21:16 +00:00
|
|
|
#
|
|
|
|
# Mail servers
|
|
|
|
#
|
|
|
|
|
2006-09-29 13:22:23 +00:00
|
|
|
[postfix]
|
2006-09-29 04:21:16 +00:00
|
|
|
|
|
|
|
enabled = false
|
|
|
|
port = smtp
|
|
|
|
filter = postfix
|
|
|
|
logpath = /var/log/postfix.log
|
|
|
|
|
2006-09-29 04:05:50 +00:00
|
|
|
|
2006-09-29 13:22:23 +00:00
|
|
|
[couriersmtp]
|
2006-09-29 04:05:50 +00:00
|
|
|
|
|
|
|
enabled = false
|
|
|
|
port = smtp
|
|
|
|
filter = couriersmtp
|
|
|
|
logpath = /var/log/mail.log
|
|
|
|
|
2006-09-29 04:21:16 +00:00
|
|
|
|
2006-09-29 13:22:23 +00:00
|
|
|
[sasl]
|
2006-09-29 04:21:16 +00:00
|
|
|
|
|
|
|
enabled = false
|
|
|
|
port = smtp
|
|
|
|
filter = sasl
|
|
|
|
logpath = /var/log/mail.log
|