From e74047ae49807a59d06ccfcc48350c2cab35c59a Mon Sep 17 00:00:00 2001 From: Alexander Koeppe Date: Tue, 17 May 2016 16:27:48 +0200 Subject: [PATCH] revert to common config for PF covering multi and allports --- config/action.d/pf-multiport.conf | 73 ------------------- config/action.d/{pf-allports.conf => pf.conf} | 11 ++- 2 files changed, 10 insertions(+), 74 deletions(-) delete mode 100644 config/action.d/pf-multiport.conf rename config/action.d/{pf-allports.conf => pf.conf} (91%) diff --git a/config/action.d/pf-multiport.conf b/config/action.d/pf-multiport.conf deleted file mode 100644 index 6814a9f31..000000000 --- a/config/action.d/pf-multiport.conf +++ /dev/null @@ -1,73 +0,0 @@ -# Fail2Ban configuration file -# -# OpenBSD pf ban/unban -# -# Author: Nick Hilliard -# Modified by: Alexander Koeppe making PF work seamless and with IPv4 and IPv6 -# -# - -[Definition] - -# Option: actionstart -# Notes.: command executed once at the start of Fail2Ban. -# Values: CMD -# -# we don't enable PF automatically; to enable run pfctl -e -# or add `pf_enable="YES"` to /etc/rc.conf (tested on FreeBSD) -actionstart = echo "table <-> persist counters" | pfctl -f- - echo "block proto from <-> to any port " | pfctl -f- - - -# Option: actionstop -# Notes.: command executed once at the end of Fail2Ban -# Values: CMD -# -# we only disable PF rules we've installed prior -actionstop = pfctl -sr 2>/dev/null | grep -v - | pfctl -f- - pfctl -t - -T flush - pfctl -t - -T kill - - -# Option: actioncheck -# Notes.: command executed once before each actionban command -# Values: CMD -# -actioncheck = pfctl -sr | grep -q - - - -# Option: actionban -# Notes.: command executed when banning an IP. Take care that the -# command is executed with Fail2Ban user rights. -# Tags: IP address -# number of failures -#