- Updated for 0.7.0

git-svn-id: https://fail2ban.svn.sourceforge.net/svnroot/fail2ban/trunk@293 a942ae1a-1317-0410-a47c-b1dcaea8d605
0.x
Cyril Jaquier 2006-08-22 22:20:09 +00:00
parent 9973bba20f
commit 0f6829bd64
2 changed files with 40 additions and 44 deletions

View File

@ -4,10 +4,10 @@
|_| \__,_|_|_/___|_.__/\__,_|_||_| |_| \__,_|_|_/___|_.__/\__,_|_||_|
============================================================= =============================================================
Fail2Ban (version 0.7.0) 2006/07/?? Fail2Ban (version 0.7.0) 2006/08/23
============================================================= =============================================================
ver. 0.7.0 (2006/07/??) - alpha ver. 0.7.0 (2006/08/23) - alpha
---------- ----------
- Almost a complete rewrite :) Fail2ban design is really - Almost a complete rewrite :) Fail2ban design is really
better (IMHO). There is a lot of new features better (IMHO). There is a lot of new features
@ -19,6 +19,7 @@ ver. 0.7.0 (2006/07/??) - alpha
to use to use
- failregex uses group (<host>) now. This feature was already - failregex uses group (<host>) now. This feature was already
present in the Debian package present in the Debian package
- lots of things...
ver. 0.6.1 (2006/03/16) - stable ver. 0.6.1 (2006/03/16) - stable
---------- ----------

79
README
View File

@ -4,7 +4,7 @@
|_| \__,_|_|_/___|_.__/\__,_|_||_| |_| \__,_|_|_/___|_.__/\__,_|_||_|
============================================================= =============================================================
Fail2Ban (version 0.6.1) 2006/03/16 Fail2Ban (version 0.7.0) 2006/08/23
============================================================= =============================================================
Fail2Ban scans log files like /var/log/pwdfail and bans IP Fail2Ban scans log files like /var/log/pwdfail and bans IP
@ -58,12 +58,12 @@ Require: python-2.4 (http://www.python.org)
To install, just do: To install, just do:
> tar xvfj fail2ban-0.6.1.tar.bz2 > tar xvfj fail2ban-0.7.0.tar.bz2
> cd fail2ban-0.6.1 > cd fail2ban-0.7.0
> python setup.py install > python setup.py install
This will install Fail2Ban into /usr/lib/fail2ban. The This will install Fail2Ban into /usr/lib/fail2ban. The
fail2ban executable is placed into /usr/bin. executable scripts are placed into /usr/bin.
Gentoo: ebuilds are available on the website. Gentoo: ebuilds are available on the website.
Debian: Fail2Ban is in Debian unstable. Debian: Fail2Ban is in Debian unstable.
@ -71,50 +71,45 @@ RedHat: packages are available on the website.
Fail2Ban should now be correctly installed. Just type: Fail2Ban should now be correctly installed. Just type:
> fail2ban -h > fail2ban-client -h
to see if everything is alright. You can configure fail2ban to see if everything is alright.
with a config file. Different kind of configuration files are
available:
iptables: copy config/fail2ban.conf.iptables to
/etc/fail2ban.conf
hosts.deny: copy config/fail2ban.conf.hostsdeny to
/etc/fail2ban.conf
shorewall: copy config/fail2ban.conf.shorewall to
/etc/fail2ban.conf
Do not forget to edit fail2ban.conf to meet your needs.
You can use the initd script available in config/. Copy
<dist>-initd to /etc/init.d/fail2ban. Gentoo users must copy
gentoo-confd to /etc/conf.d/fail2ban. You can start fail2ban:
> /etc/init.d/fail2ban start
Gentoo users can add it to the default runlevel:
> rc-update add fail2ban default
Configuration: Configuration:
-------------- --------------
You can configure fail2ban using the file /etc/fail2ban.conf You can configure fail2ban using the files in /etc/fail2ban
or using command line options. Command line options override or using command line. Here are the available command line
the value stored in fail2ban.conf. Here are the command line options (not complete yet):
options:
-b start in background <COMMAND>
-c <FILE> read configuration file FILE
-p <FILE> create PID lock in FILE start start the server and the jails
-h display this help message reload reload the configuration
-i <IP(s)> IP(s) to ignore stop stop all jails and terminate the
-k kill a currently running instance server
-r <VALUE> allow a max of VALUE password failure [maxfailures] status get the current status
-t <TIME> ban IP for TIME seconds [bantime]
-f <TIME> lifetime in seconds of failed entry [findtime] set loglevel <LEVEL> set loglevel to <LEVEL>
-v verbose. Use twice for greater effect get loglevel get loglevel
-V print software version set logtarget <TARGET> set log target to <TARGET>
get logtarget get log target
add <JAIL> create <JAIL>
set <JAIL> <CMD> set the <CMD> value for <JAIL>
get <JAIL> <CMD> get the <CMD> value for <JAIL>
start <JAIL> start <JAIL>
stop <JAIL> stop <JAIL>. The jail is removed
status <JAIL> get the current status of <JAIL>
[OPTIONS]
-c <DIR> configuration directory
-d dump configuration. For debugging
-v increase verbosity
-q decrease verbosity
-x force execution of the server
-h display this help message
Contact: Contact:
-------- --------