mirror of https://github.com/fail2ban/fail2ban
commit
472bdc437b
|
@ -71,6 +71,7 @@ ver. 0.10.6-dev (20??/??/??) - development edition
|
||||||
* parsing of action in jail-configs considers space between action-names as separator also
|
* parsing of action in jail-configs considers space between action-names as separator also
|
||||||
(previously only new-line was allowed), for example `action = a b` would specify 2 actions `a` and `b`
|
(previously only new-line was allowed), for example `action = a b` would specify 2 actions `a` and `b`
|
||||||
* new filter and jail for GitLab recognizing failed application logins (gh-2689)
|
* new filter and jail for GitLab recognizing failed application logins (gh-2689)
|
||||||
|
* new filter and jail for SoftEtherVPN recognizing failed application logins (gh-2723)
|
||||||
* `filter.d/guacamole.conf` extended with `logging` parameter to follow webapp-logging if it's configured (gh-2631)
|
* `filter.d/guacamole.conf` extended with `logging` parameter to follow webapp-logging if it's configured (gh-2631)
|
||||||
* introduced new prefix `{UNB}` for `datepattern` to disable word boundaries in regex;
|
* introduced new prefix `{UNB}` for `datepattern` to disable word boundaries in regex;
|
||||||
* datetemplate: improved anchor detection for capturing groups `(^...)`;
|
* datetemplate: improved anchor detection for capturing groups `(^...)`;
|
||||||
|
|
|
@ -0,0 +1,9 @@
|
||||||
|
# Fail2Ban filter for SoftEtherVPN
|
||||||
|
# Detecting unauthorized access to SoftEtherVPN
|
||||||
|
# typically logged in /usr/local/vpnserver/security_log/*/sec.log, or in syslog, depending on configuration
|
||||||
|
|
||||||
|
[INCLUDES]
|
||||||
|
before = common.conf
|
||||||
|
|
||||||
|
[Definition]
|
||||||
|
failregex = ^%(__prefix_line)s(?:(?:\([\d\-]+ [\d:.]+\) )?<SECURITY_LOG>: )?Connection "[^"]+": User authentication failed. The user name that has been provided was "<F-USER>(?:[^"]+|.+)</F-USER>", from <ADDR>\.$
|
|
@ -819,6 +819,11 @@ udpport = 1200,27000,27001,27002,27003,27004,27005,27006,27007,27008,27009,27010
|
||||||
action_ = %(default/action_)s[name=%(__name__)s-tcp, port="%(tcpport)s", protocol="tcp"]
|
action_ = %(default/action_)s[name=%(__name__)s-tcp, port="%(tcpport)s", protocol="tcp"]
|
||||||
%(default/action_)s[name=%(__name__)s-udp, port="%(udpport)s", protocol="udp"]
|
%(default/action_)s[name=%(__name__)s-udp, port="%(udpport)s", protocol="udp"]
|
||||||
|
|
||||||
|
[softethervpn]
|
||||||
|
port = 500,4500
|
||||||
|
protocol = udp
|
||||||
|
logpath = /usr/local/vpnserver/security_log/*/sec.log
|
||||||
|
|
||||||
[gitlab]
|
[gitlab]
|
||||||
port = http,https
|
port = http,https
|
||||||
logpath = /var/log/gitlab/gitlab-rails/application.log
|
logpath = /var/log/gitlab/gitlab-rails/application.log
|
||||||
|
|
|
@ -0,0 +1,7 @@
|
||||||
|
# Access of unauthorized host in /usr/local/vpnserver/security_log/*/sec.log
|
||||||
|
# failJSON: { "time": "2020-05-12T10:53:19", "match": true , "host": "80.10.11.12" }
|
||||||
|
2020-05-12 10:53:19.781 Connection "CID-72": User authentication failed. The user name that has been provided was "bob", from 80.10.11.12.
|
||||||
|
|
||||||
|
# Access of unauthorized host in syslog
|
||||||
|
# failJSON: { "time": "2020-05-13T10:53:19", "match": true , "host": "80.10.11.13" }
|
||||||
|
2020-05-13T10:53:19 localhost [myserver.com/VPN/defaultvpn] (2020-05-13 10:53:19.591) <SECURITY_LOG>: Connection "CID-594": User authentication failed. The user name that has been provided was "alice", from 80.10.11.13.
|
Loading…
Reference in New Issue