minor jail.conf tune ups. More needed to adopt the jails/filter added upstrean

pull/808/head
Yaroslav Halchenko 2013-11-10 00:24:24 -08:00
parent 93f30fe4f6
commit a4ab39ea82
2 changed files with 20 additions and 6 deletions

6
debian/changelog vendored
View File

@ -4,8 +4,12 @@ fail2ban (0.8.11~pre1+git29-gccd2657-1) unstable; urgency=low
* debian/watch
- restrict version matching only to numbers and period (to exclude
alpha releases of 0.9 series)
* debian/jail.conf
- slightly adjusted for changes in master (suhosin replaced
lighttpd-auth filer name, and postfix-sasl for sasl)
- added nginx-http-auth. More jails to be adopted from upsream.
--
-- Yaroslav Halchenko <debian@onerussian.com> Sun, 10 Nov 2013 00:23:24 -0800
fail2ban (0.8.10-3) unstable; urgency=low

20
debian/jail.conf vendored
View File

@ -56,6 +56,10 @@ usedns = warn
# jail.{conf,local} configuration files.
destemail = root@localhost
#
# Name of the sender for mta actions
sendername = Fail2Ban
#
# ACTIONS
#
@ -85,12 +89,12 @@ action_ = %(banaction)s[name=%(__name__)s, port="%(port)s", protocol="%(protocol
# ban & send an e-mail with whois report to the destemail.
action_mw = %(banaction)s[name=%(__name__)s, port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
%(mta)s-whois[name=%(__name__)s, dest="%(destemail)s", protocol="%(protocol)s", chain="%(chain)s"]
%(mta)s-whois[name=%(__name__)s, dest="%(destemail)s", protocol="%(protocol)s", chain="%(chain)s", sendername="%(sendername)s"]
# ban & send an e-mail with whois report and relevant log lines
# to the destemail.
action_mwl = %(banaction)s[name=%(__name__)s, port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
%(mta)s-whois-lines[name=%(__name__)s, dest="%(destemail)s", logpath=%(logpath)s, chain="%(chain)s"]
%(mta)s-whois-lines[name=%(__name__)s, dest="%(destemail)s", logpath=%(logpath)s, chain="%(chain)s", sendername="%(sendername)s"]
# Choose default action. To change, just override value of 'action' with the
# interpolation to the chosen action shortcut (e.g. action_mw, action_mwl, etc) in jail.local
@ -266,9 +270,16 @@ logpath = /var/log/lighttpd/error.log
enabled = false
port = http,https
filter = lighttpd-auth
filter = suhosin
logpath = /var/log/lighttpd/error.log
[nginx-http-auth]
enabled = false
filter = nginx-http-auth
port = http,https
logpath = /var/log/nginx/error.log
# Monitor roundcube server
[roundcube-auth]
@ -370,7 +381,7 @@ logpath = /var/log/mail.log
enabled = false
port = smtp,ssmtp,submission,imap2,imap3,imaps,pop3,pop3s
filter = sasl
filter = postfix-sasl
# You might consider monitoring /var/log/mail.warn instead if you are
# running postfix since it would provide the same log lines at the
# "warn" level but overall at the smaller filesize.
@ -436,7 +447,6 @@ protocol = tcp
filter = named-refused
logpath = /var/log/named/security.log
# Multiple jails, 1 per protocol, are necessary ATM:
# see https://github.com/fail2ban/fail2ban/issues/37
[asterisk-tcp]