mirror of https://github.com/fail2ban/fail2ban
				
				
				
			Merge branch 'misc-fixes' of https://github.com/grooverdan/fail2ban
Conflicts:
	testcases/servertestcase.py -- excluded all the changes to this file,
      since they were  conflicting and actually not needed (yet at least)
* 'misc-fixes' of https://github.com/grooverdan/fail2ban:
  PKG: change email that I want in RPMs
  BF: defer testSocket for later
  DOC: Defin{a,i}tion
  DOC: add fail2ban.1 manual page
  DOC: init -> Init, defination -> Defination. Improved intro
  DOC: punishment claimed
  BF: add missing items from MANIFEST, used by python setup.py sdist
  DOC: tags are documented in the jail.conf(5) man page
  ENH: add test case for testing socket
  ENH: jail.conf man page
  ENH: git ignore failed patch reminants
  BF: remove non-existant files from setup.py. ENH: add documentation
  ENH: packaging information for RPM builds
  completed items from TODO list
			
			
				pull/130/merge
			
			
		
						commit
						e86addf171
					
				| 
						 | 
				
			
			@ -4,3 +4,5 @@ dist
 | 
			
		|||
*.pyc
 | 
			
		||||
htmlcov
 | 
			
		||||
.coverage
 | 
			
		||||
*.orig
 | 
			
		||||
*.rej
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
							
								
								
									
										15
									
								
								MANIFEST
								
								
								
								
							
							
						
						
									
										15
									
								
								MANIFEST
								
								
								
								
							| 
						 | 
				
			
			@ -42,6 +42,7 @@ server/banmanager.py
 | 
			
		|||
server/datetemplate.py
 | 
			
		||||
server/mytime.py
 | 
			
		||||
server/failregex.py
 | 
			
		||||
testcases/files/testcase-usedns.log
 | 
			
		||||
testcases/banmanagertestcase.py
 | 
			
		||||
testcases/failmanagertestcase.py
 | 
			
		||||
testcases/clientreadertestcase.py
 | 
			
		||||
| 
						 | 
				
			
			@ -58,6 +59,7 @@ testcases/files/testcase04.log
 | 
			
		|||
setup.py
 | 
			
		||||
setup.cfg
 | 
			
		||||
common/__init__.py
 | 
			
		||||
common/exceptions.py
 | 
			
		||||
common/helpers.py
 | 
			
		||||
common/version.py
 | 
			
		||||
common/protocol.py
 | 
			
		||||
| 
						 | 
				
			
			@ -89,6 +91,17 @@ config/filter.d/vsftpd.conf
 | 
			
		|||
config/filter.d/webmin-auth.conf
 | 
			
		||||
config/filter.d/wuftpd.conf
 | 
			
		||||
config/filter.d/xinetd-fail.conf
 | 
			
		||||
config/filter.d/asterisk.conf
 | 
			
		||||
config/filter.d/dovecot.conf
 | 
			
		||||
config/filter.d/dropbear.conf
 | 
			
		||||
config/filter.d/lighttpd-auth.conf
 | 
			
		||||
config/filter.d/recidive.conf
 | 
			
		||||
config/filter.d/roundcube-auth.conf
 | 
			
		||||
config/action.d/dummy.conf
 | 
			
		||||
config/action.d/iptables-ipset-proto4.conf
 | 
			
		||||
config/action.d/iptables-ipset-proto6.conf
 | 
			
		||||
config/action.d/iptables-xt_recent-echo.conf
 | 
			
		||||
config/action.d/route.conf
 | 
			
		||||
config/action.d/complain.conf
 | 
			
		||||
config/action.d/dshield.conf
 | 
			
		||||
config/action.d/hostsdeny.conf
 | 
			
		||||
| 
						 | 
				
			
			@ -111,6 +124,8 @@ config/action.d/sendmail-whois-lines.conf
 | 
			
		|||
config/action.d/shorewall.conf
 | 
			
		||||
config/fail2ban.conf
 | 
			
		||||
man/fail2ban-client.1
 | 
			
		||||
man/fail2ban.1
 | 
			
		||||
man/jail.conf.5
 | 
			
		||||
man/fail2ban-client.h2m
 | 
			
		||||
man/fail2ban-server.1
 | 
			
		||||
man/fail2ban-server.h2m
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
							
								
								
									
										4
									
								
								TODO
								
								
								
								
							
							
						
						
									
										4
									
								
								TODO
								
								
								
								
							| 
						 | 
				
			
			@ -16,9 +16,9 @@ Legend:
 | 
			
		|||
- Run tests though all filters/examples files - (see sshd example file) as unit
 | 
			
		||||
  test
 | 
			
		||||
 | 
			
		||||
- Removed relative imports
 | 
			
		||||
* Removed relative imports
 | 
			
		||||
 | 
			
		||||
- Cleanup fail2ban-client and fail2ban-server. Move code to server/ and client/
 | 
			
		||||
* Cleanup fail2ban-client and fail2ban-server. Move code to server/ and client/
 | 
			
		||||
 | 
			
		||||
- Add timeout to external commands (signal alarm, watchdog thread, etc)
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -52,10 +52,7 @@ actioncheck =
 | 
			
		|||
# Option:  actionban
 | 
			
		||||
# Notes.:  command executed when banning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <failtime>  unix timestamp of the last failure
 | 
			
		||||
#          <bantime>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionban = ADDRESSES=`whois <ip> | perl -e 'while (<STDIN>) { next if /^changed|@(ripe|apnic)\.net/io; $m += (/abuse|trouble:|report|spam|security/io?3:0); if (/([a-z0-9_\-\.+]+@[a-z0-9\-]+(\.[[a-z0-9\-]+)+)/io) { while (s/([a-z0-9_\-\.+]+@[a-z0-9\-]+(\.[[a-z0-9\-]+)+)//io) { if ($m) { $a{lc($1)}=$m } else { $b{lc($1)}=$m } } $m=0 } else { $m && --$m } } if (%%a) {print join(",",keys(%%a))} else {print join(",",keys(%%b))}'`
 | 
			
		||||
| 
						 | 
				
			
			@ -67,9 +64,7 @@ actionban = ADDRESSES=`whois <ip> | perl -e 'while (<STDIN>) { next if /^changed
 | 
			
		|||
# Option:  actionunban
 | 
			
		||||
# Notes.:  command executed when unbanning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <bantime>  unix timestamp of the ban time
 | 
			
		||||
#          <unbantime>  unix timestamp of the unban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionunban =
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -54,9 +54,7 @@ actioncheck =
 | 
			
		|||
# Option:  actionban
 | 
			
		||||
# Notes.:  command executed when banning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
# See http://www.dshield.org/specs.html for more on report format/notes
 | 
			
		||||
| 
						 | 
				
			
			@ -91,9 +89,7 @@ actionban = TZONE=`date +%%z | sed 's/\([+-]..\)\(..\)/\1:\2/'`
 | 
			
		|||
# Option:  actionunban
 | 
			
		||||
# Notes.:  command executed when unbanning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionunban = if [ -f <tmpfile>.first ]; then
 | 
			
		||||
| 
						 | 
				
			
			@ -159,7 +155,6 @@ minreportinterval = 3600
 | 
			
		|||
#          submit the batch, even if we haven't reached <lines> yet. Note that
 | 
			
		||||
#          this is only checked on each ban/unban, and that we always send
 | 
			
		||||
#          anything in the buffer on shutdown. Must be greater than
 | 
			
		||||
#          <minreportinterval>.
 | 
			
		||||
# Values:  [ NUM ]  Default: 21600 (6 hours)
 | 
			
		||||
#
 | 
			
		||||
maxbufferage = 21600
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -29,9 +29,7 @@ actioncheck =
 | 
			
		|||
# Option:  actionban
 | 
			
		||||
# Notes.:  command executed when banning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionban = printf %%b "+<ip>\n" >> /tmp/fail2ban.dummy
 | 
			
		||||
| 
						 | 
				
			
			@ -39,9 +37,7 @@ actionban = printf %%b "+<ip>\n" >> /tmp/fail2ban.dummy
 | 
			
		|||
# Option:  actionunban
 | 
			
		||||
# Notes.:  command executed when unbanning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionunban = printf %%b "-<ip>\n" >> /tmp/fail2ban.dummy
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -28,9 +28,7 @@ actioncheck =
 | 
			
		|||
# Option:  actionban
 | 
			
		||||
# Notes.:  command executed when banning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionban = IP=<ip> &&
 | 
			
		||||
| 
						 | 
				
			
			@ -39,9 +37,7 @@ actionban = IP=<ip> &&
 | 
			
		|||
# Option:  actionunban
 | 
			
		||||
# Notes.:  command executed when unbanning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionunban = IP=<ip> && sed -i.old /ALL:\ $IP/d <file>
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -34,9 +34,7 @@ actioncheck =
 | 
			
		|||
# Option:  actionban
 | 
			
		||||
# Notes.:  command executed when banning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionban = echo block in quick from <ip>/32 | /sbin/ipf -f -
 | 
			
		||||
| 
						 | 
				
			
			@ -45,9 +43,7 @@ actionban = echo block in quick from <ip>/32 | /sbin/ipf -f -
 | 
			
		|||
# Option:  actionunban
 | 
			
		||||
# Notes.:  command executed when unbanning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
# note -r option used to remove matching rule
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -32,9 +32,7 @@ actioncheck =
 | 
			
		|||
# Option:  actionban
 | 
			
		||||
# Notes.:  command executed when banning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionban = ipfw add deny tcp from <ip> to <localhost> <port>
 | 
			
		||||
| 
						 | 
				
			
			@ -43,9 +41,7 @@ actionban = ipfw add deny tcp from <ip> to <localhost> <port>
 | 
			
		|||
# Option:  actionunban
 | 
			
		||||
# Notes.:  command executed when unbanning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionunban = ipfw delete `ipfw list | grep -i <ip> | awk '{print $1;}'`
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -34,9 +34,7 @@ actioncheck = iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \t]'
 | 
			
		|||
# Option:  actionban
 | 
			
		||||
# Notes.:  command executed when banning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionban = iptables -I fail2ban-<name> 1 -s <ip> -j DROP
 | 
			
		||||
| 
						 | 
				
			
			@ -44,9 +42,7 @@ actionban = iptables -I fail2ban-<name> 1 -s <ip> -j DROP
 | 
			
		|||
# Option:  actionunban
 | 
			
		||||
# Notes.:  command executed when unbanning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionunban = iptables -D fail2ban-<name> -s <ip> -j DROP
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -38,7 +38,7 @@ actionstop = iptables -D INPUT -p <protocol> -m multiport --dports <port> -m set
 | 
			
		|||
# Option:  actionban
 | 
			
		||||
# Notes.:  command executed when banning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionban = ipset --test fail2ban-<name> <ip> ||  ipset --add fail2ban-<name> <ip>
 | 
			
		||||
| 
						 | 
				
			
			@ -46,7 +46,7 @@ actionban = ipset --test fail2ban-<name> <ip> ||  ipset --add fail2ban-<name> <i
 | 
			
		|||
# Option:  actionunban
 | 
			
		||||
# Notes.:  command executed when unbanning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionunban = ipset --test fail2ban-<name> <ip> && ipset --del fail2ban-<name> <ip>
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -38,7 +38,7 @@ actionstop = iptables -D INPUT -p <protocol> -m multiport --dports <port> -m set
 | 
			
		|||
# Option:  actionban
 | 
			
		||||
# Notes.:  command executed when banning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionban = ipset add fail2ban-<name> <ip> timeout <bantime> -exist
 | 
			
		||||
| 
						 | 
				
			
			@ -46,7 +46,7 @@ actionban = ipset add fail2ban-<name> <ip> timeout <bantime> -exist
 | 
			
		|||
# Option:  actionunban
 | 
			
		||||
# Notes.:  command executed when unbanning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionunban = ipset del fail2ban-<name> <ip> -exist
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -42,9 +42,7 @@ actioncheck = iptables -n -L fail2ban-<name>-log >/dev/null
 | 
			
		|||
# Option:  actionban
 | 
			
		||||
# Notes.:  command executed when banning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionban = iptables -I fail2ban-<name> 1 -s <ip> -j fail2ban-<name>-log
 | 
			
		||||
| 
						 | 
				
			
			@ -52,9 +50,7 @@ actionban = iptables -I fail2ban-<name> 1 -s <ip> -j fail2ban-<name>-log
 | 
			
		|||
# Option:  actionunban
 | 
			
		||||
# Notes.:  command executed when unbanning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionunban = iptables -D fail2ban-<name> -s <ip> -j fail2ban-<name>-log
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -32,9 +32,7 @@ actioncheck = iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \t]'
 | 
			
		|||
# Option:  actionban
 | 
			
		||||
# Notes.:  command executed when banning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionban = iptables -I fail2ban-<name> 1 -s <ip> -j DROP
 | 
			
		||||
| 
						 | 
				
			
			@ -42,9 +40,7 @@ actionban = iptables -I fail2ban-<name> 1 -s <ip> -j DROP
 | 
			
		|||
# Option:  actionunban
 | 
			
		||||
# Notes.:  command executed when unbanning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionunban = iptables -D fail2ban-<name> -s <ip> -j DROP
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -34,9 +34,7 @@ actioncheck = iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \t]'
 | 
			
		|||
# Option:  actionban
 | 
			
		||||
# Notes.:  command executed when banning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionban = iptables -I fail2ban-<name> 1 -s <ip> -j DROP
 | 
			
		||||
| 
						 | 
				
			
			@ -44,9 +42,7 @@ actionban = iptables -I fail2ban-<name> 1 -s <ip> -j DROP
 | 
			
		|||
# Option:  actionunban
 | 
			
		||||
# Notes.:  command executed when unbanning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionunban = iptables -D fail2ban-<name> -s <ip> -j DROP
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -46,9 +46,7 @@ actioncheck = test -e /proc/net/xt_recent/fail2ban-<name>
 | 
			
		|||
# Option:  actionban
 | 
			
		||||
# Notes.:  command executed when banning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionban = echo +<ip> > /proc/net/xt_recent/fail2ban-<name>
 | 
			
		||||
| 
						 | 
				
			
			@ -56,9 +54,7 @@ actionban = echo +<ip> > /proc/net/xt_recent/fail2ban-<name>
 | 
			
		|||
# Option:  actionunban
 | 
			
		||||
# Notes.:  command executed when unbanning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionunban = echo -<ip> > /proc/net/xt_recent/fail2ban-<name>
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -32,9 +32,7 @@ actioncheck = iptables -n -L <chain> | grep -q 'fail2ban-<name>[ \t]'
 | 
			
		|||
# Option:  actionban
 | 
			
		||||
# Notes.:  command executed when banning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionban = iptables -I fail2ban-<name> 1 -s <ip> -j DROP
 | 
			
		||||
| 
						 | 
				
			
			@ -42,9 +40,7 @@ actionban = iptables -I fail2ban-<name> 1 -s <ip> -j DROP
 | 
			
		|||
# Option:  actionunban
 | 
			
		||||
# Notes.:  command executed when unbanning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionunban = iptables -D fail2ban-<name> -s <ip> -j DROP
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -43,9 +43,7 @@ actioncheck =
 | 
			
		|||
# Option:  actionban
 | 
			
		||||
# Notes.:  command executed when banning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionban = printf %%b "`date`: <ip> (<failures> failures)\n" >> <tmpfile>
 | 
			
		||||
| 
						 | 
				
			
			@ -62,9 +60,7 @@ actionban = printf %%b "`date`: <ip> (<failures> failures)\n" >> <tmpfile>
 | 
			
		|||
# Option:  actionunban
 | 
			
		||||
# Notes.:  command executed when unbanning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionunban = 
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -34,10 +34,7 @@ actioncheck =
 | 
			
		|||
# Option:  actionban
 | 
			
		||||
# Notes.:  command executed when banning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <failtime>  unix timestamp of the last failure
 | 
			
		||||
#          <bantime>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionban = printf %%b "Hi,\n
 | 
			
		||||
| 
						 | 
				
			
			@ -53,9 +50,7 @@ actionban = printf %%b "Hi,\n
 | 
			
		|||
# Option:  actionunban
 | 
			
		||||
# Notes.:  command executed when unbanning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <bantime>  unix timestamp of the ban time
 | 
			
		||||
#          <unbantime>  unix timestamp of the unban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionunban = 
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -34,9 +34,7 @@ actioncheck =
 | 
			
		|||
# Option:  actionban
 | 
			
		||||
# Notes.:  command executed when banning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionban = printf %%b "Hi,\n
 | 
			
		||||
| 
						 | 
				
			
			@ -50,9 +48,7 @@ actionban = printf %%b "Hi,\n
 | 
			
		|||
# Option:  actionunban
 | 
			
		||||
# Notes.:  command executed when unbanning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionunban = 
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -34,9 +34,7 @@ actioncheck =
 | 
			
		|||
# Option:  actionban
 | 
			
		||||
# Notes.:  command executed when banning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionban = printf %%b "Hi,\n
 | 
			
		||||
| 
						 | 
				
			
			@ -48,9 +46,7 @@ actionban = printf %%b "Hi,\n
 | 
			
		|||
# Option:  actionunban
 | 
			
		||||
# Notes.:  command executed when unbanning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionunban = 
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -49,9 +49,7 @@ actioncheck =
 | 
			
		|||
# Option:  actionban
 | 
			
		||||
# Notes.:  command executed when banning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
#
 | 
			
		||||
| 
						 | 
				
			
			@ -71,9 +69,7 @@ actionban = MNWLOGIN=`perl -e '$s=shift;$s=~s/([\W])/"%%".uc(sprintf("%%2.2x",or
 | 
			
		|||
# Option:  actionunban
 | 
			
		||||
# Notes.:  command executed when unbanning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionunban =
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -52,9 +52,7 @@ actioncheck =
 | 
			
		|||
# Option:  actionban
 | 
			
		||||
# Notes.:  command executed when banning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionban = printf %%b "`date`: <ip> (<failures> failures)\n" >> <tmpfile>
 | 
			
		||||
| 
						 | 
				
			
			@ -74,9 +72,7 @@ actionban = printf %%b "`date`: <ip> (<failures> failures)\n" >> <tmpfile>
 | 
			
		|||
# Option:  actionunban
 | 
			
		||||
# Notes.:  command executed when unbanning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionunban = 
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -42,9 +42,7 @@ actioncheck =
 | 
			
		|||
# Option:  actionban
 | 
			
		||||
# Notes.:  command executed when banning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionban = printf %%b "Subject: [Fail2Ban] <name>: banned <ip>
 | 
			
		||||
| 
						 | 
				
			
			@ -64,9 +62,7 @@ actionban = printf %%b "Subject: [Fail2Ban] <name>: banned <ip>
 | 
			
		|||
# Option:  actionunban
 | 
			
		||||
# Notes.:  command executed when unbanning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionunban = 
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -42,9 +42,7 @@ actioncheck =
 | 
			
		|||
# Option:  actionban
 | 
			
		||||
# Notes.:  command executed when banning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionban = printf %%b "Subject: [Fail2Ban] <name>: banned <ip>
 | 
			
		||||
| 
						 | 
				
			
			@ -62,9 +60,7 @@ actionban = printf %%b "Subject: [Fail2Ban] <name>: banned <ip>
 | 
			
		|||
# Option:  actionunban
 | 
			
		||||
# Notes.:  command executed when unbanning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionunban = 
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -42,9 +42,7 @@ actioncheck =
 | 
			
		|||
# Option:  actionban
 | 
			
		||||
# Notes.:  command executed when banning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionban = printf %%b "Subject: [Fail2Ban] <name>: banned <ip>
 | 
			
		||||
| 
						 | 
				
			
			@ -60,9 +58,7 @@ actionban = printf %%b "Subject: [Fail2Ban] <name>: banned <ip>
 | 
			
		|||
# Option:  actionunban
 | 
			
		||||
# Notes.:  command executed when unbanning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionunban = 
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -36,9 +36,7 @@ actioncheck =
 | 
			
		|||
# Option:  actionban
 | 
			
		||||
# Notes.:  command executed when banning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionban = shorewall drop <ip>
 | 
			
		||||
| 
						 | 
				
			
			@ -46,9 +44,7 @@ actionban = shorewall drop <ip>
 | 
			
		|||
# Option:  actionunban
 | 
			
		||||
# Notes.:  command executed when unbanning an IP. Take care that the
 | 
			
		||||
#          command is executed with Fail2Ban user rights.
 | 
			
		||||
# Tags:    <ip>  IP address
 | 
			
		||||
#          <failures>  number of failures
 | 
			
		||||
#          <time>  unix timestamp of the ban time
 | 
			
		||||
# Tags:    See jail.conf(5) man page
 | 
			
		||||
# Values:  CMD
 | 
			
		||||
#
 | 
			
		||||
actionunban = shorewall allow <ip>
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -0,0 +1,36 @@
 | 
			
		|||
.TH FAIL2BAN "1"
 | 
			
		||||
.SH NAME
 | 
			
		||||
fail2ban \- a set of server and client programs to limit brute force authentication attempts.
 | 
			
		||||
.SH DESCRIPTION
 | 
			
		||||
Fail2Ban consists of a client, server and some configuration files to achieve limiting 
 | 
			
		||||
brute force of authenitcation attempts.
 | 
			
		||||
 | 
			
		||||
The server program is \fBfail2ban-server\fR which is configured from the configuration files. The
 | 
			
		||||
fail2ban-server can also be configured using the \fBfail2ban-client\fR. 
 | 
			
		||||
 | 
			
		||||
For details on the configuration of fail2ban see the jail.conf(5) manual page.
 | 
			
		||||
 | 
			
		||||
For details on the configuration of fail2ban-server see the fail2ban-server(1) manual page.
 | 
			
		||||
 | 
			
		||||
For details on the configuration of fail2ban-client see the fail2ban-client(1) manual page.
 | 
			
		||||
 | 
			
		||||
For testing regular expressions assocated with filter using the fail2ban-regex program may be of
 | 
			
		||||
use and its manual page is fail2ban-regex(1).
 | 
			
		||||
 | 
			
		||||
.SH FILES
 | 
			
		||||
\fI/etc/fail2ban/*\fR
 | 
			
		||||
.SH AUTHOR
 | 
			
		||||
Manual page written by Daniel Black
 | 
			
		||||
.SH "REPORTING BUGS"
 | 
			
		||||
Report bugs to https://github.com/fail2ban/fail2ban/issues
 | 
			
		||||
.SH COPYRIGHT
 | 
			
		||||
Copyright \(co 2013
 | 
			
		||||
.br
 | 
			
		||||
Copyright of modifications held by their respective authors.
 | 
			
		||||
Licensed under the GNU General Public License v2 (GPL).
 | 
			
		||||
.SH "SEE ALSO"
 | 
			
		||||
.br 
 | 
			
		||||
fail2ban-server(1)
 | 
			
		||||
fail2ban-client(1)
 | 
			
		||||
jail.conf(5)
 | 
			
		||||
fail2ban-regex(1)
 | 
			
		||||
| 
						 | 
				
			
			@ -0,0 +1,151 @@
 | 
			
		|||
.TH JAIL.CONF.5 "fail2ban" "jail.conf(5)"
 | 
			
		||||
.SH NAME
 | 
			
		||||
jail.conf \- configuration for the fail2ban server
 | 
			
		||||
.SH SYNOPSIS
 | 
			
		||||
.B jail.conf / jail.local
 | 
			
		||||
 | 
			
		||||
.B action.d/*.conf action.d/*.local
 | 
			
		||||
 | 
			
		||||
.B filter.d/*.conf filter.d/*.local
 | 
			
		||||
.SH DESCRIPTION
 | 
			
		||||
Fail2ban has three configuration file types. Action files are the commands for banning and unbanning IP address,
 | 
			
		||||
Filter files tell fail2ban how authentication failures occur, and Jail configurations that map the two together.
 | 
			
		||||
 | 
			
		||||
There are *.conf files that are distributed by fail2ban and *.local file that contain user overwritten files. 
 | 
			
		||||
It is recommended that *.conf files are not changed. *.local files are where users overwrite their default settings.
 | 
			
		||||
For instance if you require the default [ssh-iptables-ipset] jail create a jail.local to extend jail.conf (
 | 
			
		||||
the configuration for the fail2ban server). The jail.local file will be the following if you only need to enable
 | 
			
		||||
it:
 | 
			
		||||
 | 
			
		||||
.TP
 | 
			
		||||
\fBjail.local\fR
 | 
			
		||||
[ssh-iptables-ipset]
 | 
			
		||||
 | 
			
		||||
enabled = true
 | 
			
		||||
.TP
 | 
			
		||||
 | 
			
		||||
Only overwride the settings you need to change and the rest of the configuration comes from the corresponding
 | 
			
		||||
*.conf file.
 | 
			
		||||
 | 
			
		||||
.SH DEFAULT
 | 
			
		||||
The following options are applicable to all jails. Their meaning is in the default jail.conf file.
 | 
			
		||||
.TP
 | 
			
		||||
\fBignoreip\fR 
 | 
			
		||||
.TP
 | 
			
		||||
\fBbantime\fR
 | 
			
		||||
.TP
 | 
			
		||||
\fBfindtime\fR
 | 
			
		||||
.TP
 | 
			
		||||
\fBmaxretry\fR
 | 
			
		||||
.TP
 | 
			
		||||
\fBbackend\fR
 | 
			
		||||
.TP
 | 
			
		||||
\fBusedns\fR
 | 
			
		||||
.TP
 | 
			
		||||
.SH ACTION FILES
 | 
			
		||||
Action files specify which commands are executed to ban an IP address. They are located in /etc/fail2ban/action.d.
 | 
			
		||||
 | 
			
		||||
Like jail.conf files if you desire local changes create a [actionname].local file in the /etc/fail2ban/action.d directory 
 | 
			
		||||
and override the required settings.
 | 
			
		||||
 | 
			
		||||
The action files are ini files that have two sections, \fBDefinition\fR and \fBInit\fR . 
 | 
			
		||||
 | 
			
		||||
The [Init] section allows for settings relevant to the action. In jail.conf/jail.local these can be overwritten for a particular jail.
 | 
			
		||||
 | 
			
		||||
The commands are specified in the [Definition] section as below..
 | 
			
		||||
 | 
			
		||||
The commands are executed through a system shell so shell redirection and process control is allowed. The commands should
 | 
			
		||||
return 0 to indicate success which will prevent fail2ban attempting to retry (up to \fBmaxretry\fR times to ban the IP again.
 | 
			
		||||
 | 
			
		||||
The following action parameters are in the [Definition] section.
 | 
			
		||||
.TP
 | 
			
		||||
\fBactionstart\fR
 | 
			
		||||
This is the commands that are executed when the jail starts.
 | 
			
		||||
.TP
 | 
			
		||||
\fBactionstop\fR
 | 
			
		||||
This is the commands that are executed when the jail stops.
 | 
			
		||||
.TP
 | 
			
		||||
\fBactioncheck\fR
 | 
			
		||||
This is the command that is before each other action. It checks to see if the environment is ok.
 | 
			
		||||
.TP
 | 
			
		||||
\fBactionban\fR
 | 
			
		||||
This is the command that bans the IP address.
 | 
			
		||||
.TP
 | 
			
		||||
\fBactionunban\fR
 | 
			
		||||
This is the command that unbans the IP address after \fBbantime\fR.
 | 
			
		||||
 | 
			
		||||
Tags are in <>. All the elements of [Init] are tags that are replaced in all action commands. Tags can be added by the
 | 
			
		||||
\fBfail2ban-client\fR using the setctag command.
 | 
			
		||||
 | 
			
		||||
More that one command is allowed. Each command needs to be on a new line and indented with whitespace with no blank lines. The following defines
 | 
			
		||||
two commands to be executed.
 | 
			
		||||
 | 
			
		||||
actionban = iptables -I fail2ban-<name> --source <ip> -j DROP
 | 
			
		||||
 | 
			
		||||
    echo ip=<ip>, match=<match>, time=<time> >> /var/log/fail2ban.log
 | 
			
		||||
 | 
			
		||||
The following tags are also substituted in the actionban, actionunban and actioncheck (when called before actionban/actionunban).
 | 
			
		||||
.TP
 | 
			
		||||
\fBip\fR
 | 
			
		||||
An IPv4 ip address to be banned. e.g. 192.168.0.2
 | 
			
		||||
.TP
 | 
			
		||||
.TP
 | 
			
		||||
\fBfailures\fR
 | 
			
		||||
The number of times the failure occurred in the log file. e.g. 3
 | 
			
		||||
.TP
 | 
			
		||||
\fBtime\fR
 | 
			
		||||
The unix time of the ban. e.g. 1357508484
 | 
			
		||||
.TP
 | 
			
		||||
\fBmatches\fR
 | 
			
		||||
The concatinated string of the log file lines of the matches that generated the ban.
 | 
			
		||||
 | 
			
		||||
.SH FILTER FILES
 | 
			
		||||
 | 
			
		||||
Filter definitions are those in /etc/fail2ban/filter.d/*.conf and filter.d/*.local.
 | 
			
		||||
 | 
			
		||||
These are used to identify failed authenicate attempts in logs and to extract the host IP address or hostname.
 | 
			
		||||
 | 
			
		||||
Like action files, filter files are ini files. The main section is the [Definition] section.
 | 
			
		||||
 | 
			
		||||
There are two filter definitions used in the [Definition] section, failregex and ignoreregex.
 | 
			
		||||
Other definitions are allowed and can be used to substitue into other definitions with %(defnname). For example.
 | 
			
		||||
 | 
			
		||||
baduseragents = IE|wget
 | 
			
		||||
 | 
			
		||||
failregex = useragent=%(baduseragents)
 | 
			
		||||
 | 
			
		||||
The \fBfailregex\fR and \fBignoreregex\fR have the following meanings:
 | 
			
		||||
 | 
			
		||||
.TP
 | 
			
		||||
\fBfailregex\fR
 | 
			
		||||
is the regex that will match failed attempts. The tag <HOST> is used as part of the regex and is itself a regex
 | 
			
		||||
for IPv4 addresses and hostnames. fail2ban will work out which one of these it actually is.
 | 
			
		||||
 | 
			
		||||
.TP
 | 
			
		||||
\fBignoreregex\fR
 | 
			
		||||
is the regex that will be ignored by fail2ban, even if failregex matches.
 | 
			
		||||
 | 
			
		||||
.PP
 | 
			
		||||
Filters can also have a section called [INCLUDES]. This is used to read other configuration files.
 | 
			
		||||
 | 
			
		||||
.TP
 | 
			
		||||
\fBbefore\fR
 | 
			
		||||
indicates that this file is read before the [Definition] section.
 | 
			
		||||
 | 
			
		||||
.TP
 | 
			
		||||
\fBafter\fR
 | 
			
		||||
indicates that this file is read after the [Definition] section.
 | 
			
		||||
 | 
			
		||||
.SH AUTHOR
 | 
			
		||||
Fail2ban Written by Cyril Jaquier <cyril.jaquier@fail2ban.org> with many contributions by Yaroslav O. Halchenko <debian@onerussian.com>.
 | 
			
		||||
Manual page written by Daniel Black.
 | 
			
		||||
.SH "REPORTING BUGS"
 | 
			
		||||
Report bugs to https://github.com/fail2ban/fail2ban/issues
 | 
			
		||||
.SH COPYRIGHT
 | 
			
		||||
Copyright \(co 2013 Daniel Black
 | 
			
		||||
.br
 | 
			
		||||
Copyright of modifications held by their respective authors.
 | 
			
		||||
Licensed under the GNU General Public License v2 (GPL).
 | 
			
		||||
.SH "SEE ALSO"
 | 
			
		||||
.br 
 | 
			
		||||
fail2ban-server(1)
 | 
			
		||||
| 
						 | 
				
			
			@ -3,3 +3,11 @@ install-purelib=/usr/share/fail2ban
 | 
			
		|||
 | 
			
		||||
[sdist]
 | 
			
		||||
formats=bztar
 | 
			
		||||
 | 
			
		||||
[bdist_rpm]
 | 
			
		||||
release = 1
 | 
			
		||||
packager = Yaroslav Halchenko <debian@onerussian.com>, Daniel Black <grooverdan@users.sourceforge.net>
 | 
			
		||||
doc_files = DEVELOP
 | 
			
		||||
            README
 | 
			
		||||
            THANKS
 | 
			
		||||
            doc/run-rootless.txt
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
							
								
								
									
										11
									
								
								setup.py
								
								
								
								
							
							
						
						
									
										11
									
								
								setup.py
								
								
								
								
							| 
						 | 
				
			
			@ -67,6 +67,9 @@ setup(
 | 
			
		|||
						),
 | 
			
		||||
						('/var/run/fail2ban',
 | 
			
		||||
							''
 | 
			
		||||
						),
 | 
			
		||||
						('/usr/share/doc/fail2ban',
 | 
			
		||||
							['README', 'DEVELOP', 'doc/run-rootless.txt']
 | 
			
		||||
						)
 | 
			
		||||
					]
 | 
			
		||||
)
 | 
			
		||||
| 
						 | 
				
			
			@ -82,13 +85,7 @@ elements =	{
 | 
			
		|||
				"/usr/bin/":
 | 
			
		||||
					[
 | 
			
		||||
						"fail2ban.py"
 | 
			
		||||
					],
 | 
			
		||||
				"/usr/lib/fail2ban/firewall/":
 | 
			
		||||
					[
 | 
			
		||||
						"iptables.py",
 | 
			
		||||
						"ipfwadm.py",
 | 
			
		||||
						"ipfw.py"
 | 
			
		||||
					],
 | 
			
		||||
					], 
 | 
			
		||||
				"/usr/lib/fail2ban/":
 | 
			
		||||
					[
 | 
			
		||||
						"version.py",
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
		Reference in New Issue