diff --git a/config/action.d/osx-ipfw.conf b/config/action.d/osx-ipfw.conf new file mode 100644 index 00000000..8cd36df6 --- /dev/null +++ b/config/action.d/osx-ipfw.conf @@ -0,0 +1,67 @@ +# Fail2Ban configuration file +# +# Author: Nick Munger +# Modified by: Andy Fragen +# +# Mod for OS X, using random rulenum +# + +[Definition] + +# Option: actionstart +# Notes.: command executed once at the start of Fail2Ban. +# Values: CMD +# +actionstart = + + +# Option: actionstop +# Notes.: command executed once at the end of Fail2Ban +# Values: CMD +# +actionstop = + + +# Option: actioncheck +# Notes.: command executed once before each actionban command +# Values: CMD +# +actioncheck = + + +# Option: actionban +# Notes.: command executed when banning an IP. Take care that the +# command is executed with Fail2Ban user rights. +# Tags: IP address +# Values: CMD +# +actionban = ipfw add set 10 deny log tcp from to + + +# Option: actionunban +# Notes.: command executed when unbanning an IP. Take care that the +# command is executed with Fail2Ban user rights. +# Tags: IP address +# Values: CMD +# +actionunban = ipfw delete `ipfw list | grep -i | awk '{print $1;}'` + +[Init] + +# Option: port +# Notes.: specifies port to monitor +# Values: [ NUM | STRING ] +# +port = ssh + +# Option: localhost +# Notes.: the local IP address of the network interface +# Values: IP +# +localhost = 127.0.0.1 + +# Option: number for ipfw rule +# Values: 1 - 65535 +# Random value between 10000 and 12000 +rulenum = "`echo $((RANDOM%%2000+10000))`" +