mirror of https://github.com/fail2ban/fail2ban
named_refused: moved fix for proper config+filters from dpatch
parent
bce05a1285
commit
a9ee3c0b47
|
@ -9,10 +9,8 @@
|
||||||
|
|
||||||
[Definition]
|
[Definition]
|
||||||
|
|
||||||
# if you want to catch only login erros from specific daemons, use smth like
|
#
|
||||||
#_named_rcodes=(?:REFUSED|SERVFAIL)
|
# Daemon name
|
||||||
# To catch all REFUSED queries only
|
|
||||||
_named_rcodes=REFUSED
|
|
||||||
_daemon=named
|
_daemon=named
|
||||||
|
|
||||||
#
|
#
|
||||||
|
@ -28,7 +26,6 @@ __line_prefix=(?:\s\S+ %(__daemon_combs_re)s\s+)?
|
||||||
# Notes.: regex to match the password failures messages in the logfile.
|
# Notes.: regex to match the password failures messages in the logfile.
|
||||||
# Values: TEXT
|
# Values: TEXT
|
||||||
#
|
#
|
||||||
failregex = %(__line_prefix)sunexpected RCODE \(%(_named_rcodes)s\) resolving '.*': <HOST>#\S+$
|
failregex = %(__line_prefix)sclient <HOST>#\S+: query(?: \(cache\))? '.*' denied\s*$
|
||||||
%(__line_prefix)sclient <HOST>#\S+: query(?: \(cache\))? '.*' denied\s*$
|
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -170,13 +170,13 @@ ignoreip = 168.192.0.1
|
||||||
# with bind9 installation. You will need something like this:
|
# with bind9 installation. You will need something like this:
|
||||||
#
|
#
|
||||||
# logging {
|
# logging {
|
||||||
# channel lame-servers_file {
|
# channel security_file {
|
||||||
# file "/var/log/named/lame-servers.log" versions 3 size 30m;
|
# file "/var/log/named/security.log" versions 3 size 30m;
|
||||||
# severity dynamic;
|
# severity dynamic;
|
||||||
# print-time yes;
|
# print-time yes;
|
||||||
# };
|
# };
|
||||||
# category lame-servers {
|
# category security {
|
||||||
# lame-servers_file;
|
# security_file;
|
||||||
# };
|
# };
|
||||||
# }
|
# }
|
||||||
#
|
#
|
||||||
|
@ -189,7 +189,7 @@ enabled = false
|
||||||
filter = named-refused
|
filter = named-refused
|
||||||
action = iptables-multiport[name=Named, port="domain,953", protocol=udp]
|
action = iptables-multiport[name=Named, port="domain,953", protocol=udp]
|
||||||
sendmail-whois[name=Named, dest=you@mail.com]
|
sendmail-whois[name=Named, dest=you@mail.com]
|
||||||
logpath = /var/log/named/lame-servers.log
|
logpath = /var/log/named/security.log
|
||||||
ignoreip = 168.192.0.1
|
ignoreip = 168.192.0.1
|
||||||
|
|
||||||
# This jail blocks TCP traffic for DNS requests.
|
# This jail blocks TCP traffic for DNS requests.
|
||||||
|
@ -200,6 +200,6 @@ enabled = false
|
||||||
filter = named-refused
|
filter = named-refused
|
||||||
action = iptables-multiport[name=Named, port="domain,953", protocol=tcp]
|
action = iptables-multiport[name=Named, port="domain,953", protocol=tcp]
|
||||||
sendmail-whois[name=Named, dest=you@mail.com]
|
sendmail-whois[name=Named, dest=you@mail.com]
|
||||||
logpath = /var/log/named/lame-servers.log
|
logpath = /var/log/named/security.log
|
||||||
ignoreip = 168.192.0.1
|
ignoreip = 168.192.0.1
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue