mirror of https://github.com/fail2ban/fail2ban
- Added "fwcheck", "reinittime" and "maxreinits"
- Added "<section>" in email git-svn-id: https://fail2ban.svn.sourceforge.net/svnroot/fail2ban/branches/FAIL2BAN-0_5@203 a942ae1a-1317-0410-a47c-b1dcaea8d6050.5
parent
1c3f233475
commit
31abe6f37c
|
@ -85,6 +85,21 @@ cmdend =
|
||||||
#
|
#
|
||||||
polltime = 1
|
polltime = 1
|
||||||
|
|
||||||
|
# Option: reinittime
|
||||||
|
# Notes.: minimal number of seconds between the re-initialization of
|
||||||
|
# firewalls due to external changes in their rules (see fwcheck)
|
||||||
|
# Values: NUM Default: 100
|
||||||
|
#
|
||||||
|
reinittime = 10
|
||||||
|
|
||||||
|
# Option: maxreinits
|
||||||
|
# Notes.: maximal number of re-initialization of firewalls due to external
|
||||||
|
# changes. -1 stays for infinite, so only reinittime is of importance
|
||||||
|
# Values: NUM Default: -1
|
||||||
|
#
|
||||||
|
maxreinits = -1
|
||||||
|
|
||||||
|
|
||||||
[MAIL]
|
[MAIL]
|
||||||
# Option: enabled
|
# Option: enabled
|
||||||
# Notes.: enable mail notification when banning an IP address.
|
# Notes.: enable mail notification when banning an IP address.
|
||||||
|
@ -119,16 +134,18 @@ to = root
|
||||||
|
|
||||||
# Option: subject
|
# Option: subject
|
||||||
# Notes.: subject of the e-mail.
|
# Notes.: subject of the e-mail.
|
||||||
# Tags: <ip> IP address
|
# Tags: <section> active section (eg ssh, apache, etc)
|
||||||
|
# <ip> IP address
|
||||||
# <failures> number of failures
|
# <failures> number of failures
|
||||||
# <failtime> unix timestamp of the last failure
|
# <failtime> unix timestamp of the last failure
|
||||||
# Values: TEXT Default: [Fail2Ban] Banned <ip>
|
# Values: TEXT Default: [Fail2Ban] <section>: Banned <ip>
|
||||||
#
|
#
|
||||||
subject = [Fail2Ban] Banned <ip>
|
subject = [Fail2Ban] <section>: Banned <ip>
|
||||||
|
|
||||||
# Option: message
|
# Option: message
|
||||||
# Notes.: message of the e-mail.
|
# Notes.: message of the e-mail.
|
||||||
# Tags: <ip> IP address
|
# Tags: <section> active section (eg ssh, apache, etc)
|
||||||
|
# <ip> IP address
|
||||||
# <failures> number of failures
|
# <failures> number of failures
|
||||||
# <failtime> unix timestamp of the last failure
|
# <failtime> unix timestamp of the last failure
|
||||||
# <br> new line
|
# <br> new line
|
||||||
|
@ -136,7 +153,7 @@ subject = [Fail2Ban] Banned <ip>
|
||||||
#
|
#
|
||||||
message = Hi,<br>
|
message = Hi,<br>
|
||||||
The IP <ip> has just been banned by Fail2Ban after
|
The IP <ip> has just been banned by Fail2Ban after
|
||||||
<failures> attempts.<br>
|
<failures> attempts against <section>.<br>
|
||||||
Regards,<br>
|
Regards,<br>
|
||||||
Fail2Ban
|
Fail2Ban
|
||||||
|
|
||||||
|
@ -145,6 +162,7 @@ message = Hi,<br>
|
||||||
# options: logfile, fwban, fwunban, timeregex, timepattern,
|
# options: logfile, fwban, fwunban, timeregex, timepattern,
|
||||||
# failregex.
|
# failregex.
|
||||||
|
|
||||||
|
|
||||||
[Apache]
|
[Apache]
|
||||||
# Option: enabled
|
# Option: enabled
|
||||||
# Notes.: enable monitoring for this section.
|
# Notes.: enable monitoring for this section.
|
||||||
|
@ -171,9 +189,15 @@ fwstart = iptables -N fail2ban-http
|
||||||
# Values: CMD Default:
|
# Values: CMD Default:
|
||||||
#
|
#
|
||||||
fwend = iptables -D INPUT -p tcp --dport http -j fail2ban-http
|
fwend = iptables -D INPUT -p tcp --dport http -j fail2ban-http
|
||||||
iptables -D fail2ban-http -j RETURN
|
iptables -F fail2ban-http
|
||||||
iptables -X fail2ban-http
|
iptables -X fail2ban-http
|
||||||
|
|
||||||
|
# Option: fwcheck
|
||||||
|
# Notes.: command executed once before each fwban command
|
||||||
|
# Values: CMD Default:
|
||||||
|
#
|
||||||
|
fwcheck = iptables -L INPUT | grep -q fail2ban-http
|
||||||
|
|
||||||
# Option: fwban
|
# Option: fwban
|
||||||
# Notes.: command executed when banning an IP. Take care that the
|
# Notes.: command executed when banning an IP. Take care that the
|
||||||
# command is executed with Fail2Ban user rights.
|
# command is executed with Fail2Ban user rights.
|
||||||
|
@ -217,6 +241,7 @@ timepattern = %%a %%b %%d %%H:%%M:%%S %%Y
|
||||||
#
|
#
|
||||||
failregex = authentication failure|user .* not found
|
failregex = authentication failure|user .* not found
|
||||||
|
|
||||||
|
|
||||||
[SSH]
|
[SSH]
|
||||||
# Option: enabled
|
# Option: enabled
|
||||||
# Notes.: enable monitoring for this section.
|
# Notes.: enable monitoring for this section.
|
||||||
|
@ -243,9 +268,15 @@ fwstart = iptables -N fail2ban-ssh
|
||||||
# Values: CMD Default:
|
# Values: CMD Default:
|
||||||
#
|
#
|
||||||
fwend = iptables -D INPUT -p tcp --dport ssh -j fail2ban-ssh
|
fwend = iptables -D INPUT -p tcp --dport ssh -j fail2ban-ssh
|
||||||
iptables -D fail2ban-ssh -j RETURN
|
iptables -F fail2ban-ssh
|
||||||
iptables -X fail2ban-ssh
|
iptables -X fail2ban-ssh
|
||||||
|
|
||||||
|
# Option: fwcheck
|
||||||
|
# Notes.: command executed once before each fwban command
|
||||||
|
# Values: CMD Default:
|
||||||
|
#
|
||||||
|
fwcheck = iptables -L INPUT | grep -q fail2ban-ssh
|
||||||
|
|
||||||
# Option: fwbanrule
|
# Option: fwbanrule
|
||||||
# Notes.: command executed when banning an IP. Take care that the
|
# Notes.: command executed when banning an IP. Take care that the
|
||||||
# command is executed with Fail2Ban user rights.
|
# command is executed with Fail2Ban user rights.
|
||||||
|
|
Loading…
Reference in New Issue