named_refused: moved fix for proper config+filters from dpatch

debian-releases/squeeze
Yaroslav Halchenko 2008-02-08 00:38:02 -05:00
parent bce05a1285
commit a9ee3c0b47
2 changed files with 9 additions and 12 deletions

View File

@ -9,10 +9,8 @@
[Definition] [Definition]
# if you want to catch only login erros from specific daemons, use smth like #
#_named_rcodes=(?:REFUSED|SERVFAIL) # Daemon name
# To catch all REFUSED queries only
_named_rcodes=REFUSED
_daemon=named _daemon=named
# #
@ -28,7 +26,6 @@ __line_prefix=(?:\s\S+ %(__daemon_combs_re)s\s+)?
# Notes.: regex to match the password failures messages in the logfile. # Notes.: regex to match the password failures messages in the logfile.
# Values: TEXT # Values: TEXT
# #
failregex = %(__line_prefix)sunexpected RCODE \(%(_named_rcodes)s\) resolving '.*': <HOST>#\S+$ failregex = %(__line_prefix)sclient <HOST>#\S+: query(?: \(cache\))? '.*' denied\s*$
%(__line_prefix)sclient <HOST>#\S+: query(?: \(cache\))? '.*' denied\s*$

View File

@ -170,13 +170,13 @@ ignoreip = 168.192.0.1
# with bind9 installation. You will need something like this: # with bind9 installation. You will need something like this:
# #
# logging { # logging {
# channel lame-servers_file { # channel security_file {
# file "/var/log/named/lame-servers.log" versions 3 size 30m; # file "/var/log/named/security.log" versions 3 size 30m;
# severity dynamic; # severity dynamic;
# print-time yes; # print-time yes;
# }; # };
# category lame-servers { # category security {
# lame-servers_file; # security_file;
# }; # };
# } # }
# #
@ -189,7 +189,7 @@ enabled = false
filter = named-refused filter = named-refused
action = iptables-multiport[name=Named, port="domain,953", protocol=udp] action = iptables-multiport[name=Named, port="domain,953", protocol=udp]
sendmail-whois[name=Named, dest=you@mail.com] sendmail-whois[name=Named, dest=you@mail.com]
logpath = /var/log/named/lame-servers.log logpath = /var/log/named/security.log
ignoreip = 168.192.0.1 ignoreip = 168.192.0.1
# This jail blocks TCP traffic for DNS requests. # This jail blocks TCP traffic for DNS requests.
@ -200,6 +200,6 @@ enabled = false
filter = named-refused filter = named-refused
action = iptables-multiport[name=Named, port="domain,953", protocol=tcp] action = iptables-multiport[name=Named, port="domain,953", protocol=tcp]
sendmail-whois[name=Named, dest=you@mail.com] sendmail-whois[name=Named, dest=you@mail.com]
logpath = /var/log/named/lame-servers.log logpath = /var/log/named/security.log
ignoreip = 168.192.0.1 ignoreip = 168.192.0.1