mirror of https://github.com/fail2ban/fail2ban
				
				
				
			Merge branch 'debian' into debian-release
* debian: Replacing word of caution with big fat warning and commenting out named-refused-udp completely (Closes: #583364) Adding arno-iptables-firewall (no deprecation of ipmasq per Joey Hess mentioning, which still could be used on lenny systems)debian-releases/squeeze
						commit
						20c0d92e89
					
				| 
						 | 
					@ -3,8 +3,8 @@
 | 
				
			||||||
# Provides:          fail2ban
 | 
					# Provides:          fail2ban
 | 
				
			||||||
# Required-Start:    $local_fs $remote_fs
 | 
					# Required-Start:    $local_fs $remote_fs
 | 
				
			||||||
# Required-Stop:     $local_fs $remote_fs
 | 
					# Required-Stop:     $local_fs $remote_fs
 | 
				
			||||||
# Should-Start:      $time $network $syslog iptables firehol shorewall ipmasq
 | 
					# Should-Start:      $time $network $syslog iptables firehol shorewall ipmasq arno-iptables-firewall
 | 
				
			||||||
# Should-Stop:       $network $syslog iptables firehol shorewall ipmasq
 | 
					# Should-Stop:       $network $syslog iptables firehol shorewall ipmasq arno-iptables-firewall
 | 
				
			||||||
# Default-Start:     2 3 4 5
 | 
					# Default-Start:     2 3 4 5
 | 
				
			||||||
# Default-Stop:      0 1 6
 | 
					# Default-Stop:      0 1 6
 | 
				
			||||||
# Short-Description: Start/stop fail2ban
 | 
					# Short-Description: Start/stop fail2ban
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -262,17 +262,20 @@ logpath  = /var/log/mail.log
 | 
				
			||||||
#
 | 
					#
 | 
				
			||||||
# in your named.conf to provide proper logging
 | 
					# in your named.conf to provide proper logging
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# Word of Caution:
 | 
					# !!! WARNING !!!
 | 
				
			||||||
# Given filter can lead to DoS attack against your DNS server
 | 
					#   Since UDP is connectionless protocol, spoofing of IP and immitation
 | 
				
			||||||
# since there is no way to assure that UDP packets come from the
 | 
					#   of illegal actions is way too simple.  Thus enabling of this filter
 | 
				
			||||||
# real source IP
 | 
					#   might provide an easy way for implementing a DoS against a chosen
 | 
				
			||||||
[named-refused-udp]
 | 
					#   victim. See
 | 
				
			||||||
 | 
					#    http://nion.modprobe.de/blog/archives/690-fail2ban-+-dns-fail.html
 | 
				
			||||||
enabled  = false
 | 
					#   Please DO NOT USE this jail unless you know what you are doing.
 | 
				
			||||||
port     = domain,953
 | 
					#[named-refused-udp]
 | 
				
			||||||
protocol = udp
 | 
					#
 | 
				
			||||||
filter   = named-refused
 | 
					#enabled  = false
 | 
				
			||||||
logpath  = /var/log/named/security.log
 | 
					#port     = domain,953
 | 
				
			||||||
 | 
					#protocol = udp
 | 
				
			||||||
 | 
					#filter   = named-refused
 | 
				
			||||||
 | 
					#logpath  = /var/log/named/security.log
 | 
				
			||||||
 | 
					
 | 
				
			||||||
[named-refused-tcp]
 | 
					[named-refused-tcp]
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
		Loading…
	
		Reference in New Issue