mirror of https://github.com/fail2ban/fail2ban
				
				
				
			Merge branch 'debian' into debian-release
* debian: Replacing word of caution with big fat warning and commenting out named-refused-udp completely (Closes: #583364) Adding arno-iptables-firewall (no deprecation of ipmasq per Joey Hess mentioning, which still could be used on lenny systems)debian-releases/squeeze
						commit
						20c0d92e89
					
				| 
						 | 
				
			
			@ -3,8 +3,8 @@
 | 
			
		|||
# Provides:          fail2ban
 | 
			
		||||
# Required-Start:    $local_fs $remote_fs
 | 
			
		||||
# Required-Stop:     $local_fs $remote_fs
 | 
			
		||||
# Should-Start:      $time $network $syslog iptables firehol shorewall ipmasq
 | 
			
		||||
# Should-Stop:       $network $syslog iptables firehol shorewall ipmasq
 | 
			
		||||
# Should-Start:      $time $network $syslog iptables firehol shorewall ipmasq arno-iptables-firewall
 | 
			
		||||
# Should-Stop:       $network $syslog iptables firehol shorewall ipmasq arno-iptables-firewall
 | 
			
		||||
# Default-Start:     2 3 4 5
 | 
			
		||||
# Default-Stop:      0 1 6
 | 
			
		||||
# Short-Description: Start/stop fail2ban
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -262,17 +262,20 @@ logpath  = /var/log/mail.log
 | 
			
		|||
#
 | 
			
		||||
# in your named.conf to provide proper logging
 | 
			
		||||
 | 
			
		||||
# Word of Caution:
 | 
			
		||||
# Given filter can lead to DoS attack against your DNS server
 | 
			
		||||
# since there is no way to assure that UDP packets come from the
 | 
			
		||||
# real source IP
 | 
			
		||||
[named-refused-udp]
 | 
			
		||||
 | 
			
		||||
enabled  = false
 | 
			
		||||
port     = domain,953
 | 
			
		||||
protocol = udp
 | 
			
		||||
filter   = named-refused
 | 
			
		||||
logpath  = /var/log/named/security.log
 | 
			
		||||
# !!! WARNING !!!
 | 
			
		||||
#   Since UDP is connectionless protocol, spoofing of IP and immitation
 | 
			
		||||
#   of illegal actions is way too simple.  Thus enabling of this filter
 | 
			
		||||
#   might provide an easy way for implementing a DoS against a chosen
 | 
			
		||||
#   victim. See
 | 
			
		||||
#    http://nion.modprobe.de/blog/archives/690-fail2ban-+-dns-fail.html
 | 
			
		||||
#   Please DO NOT USE this jail unless you know what you are doing.
 | 
			
		||||
#[named-refused-udp]
 | 
			
		||||
#
 | 
			
		||||
#enabled  = false
 | 
			
		||||
#port     = domain,953
 | 
			
		||||
#protocol = udp
 | 
			
		||||
#filter   = named-refused
 | 
			
		||||
#logpath  = /var/log/named/security.log
 | 
			
		||||
 | 
			
		||||
[named-refused-tcp]
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
		Reference in New Issue