mirror of https://github.com/fail2ban/fail2ban
BF: firewall-cmd-direct-new was too long. Thanks Joel.
parent
f80fa7d7a0
commit
fb666b69ff
|
@ -13,6 +13,8 @@ ver. 0.8.12 (2013/12/XX) - things-can-only-get-better
|
||||||
- IMPORTANT incompatible changes:
|
- IMPORTANT incompatible changes:
|
||||||
|
|
||||||
- Fixes:
|
- Fixes:
|
||||||
|
- Rename firewall-cmd-direct-new to firewall-cmd-new to fit within jail name
|
||||||
|
name length. As per gh-395
|
||||||
- allow for ",milliseconds" in the custom date format of proftpd.log
|
- allow for ",milliseconds" in the custom date format of proftpd.log
|
||||||
- allow for ", referer ..." in apache-* filter for apache error logs.
|
- allow for ", referer ..." in apache-* filter for apache error logs.
|
||||||
- allow for spaces at the beginning of kernel messages. Closes gh-448
|
- allow for spaces at the beginning of kernel messages. Closes gh-448
|
||||||
|
|
|
@ -1,52 +0,0 @@
|
||||||
# Fail2Ban configuration file
|
|
||||||
#
|
|
||||||
# Author: Edgar Hoch
|
|
||||||
# Copied from iptables-new.conf and modified for use with firewalld by Edgar Hoch.
|
|
||||||
# It uses "firewall-cmd" instead of "iptables".
|
|
||||||
#
|
|
||||||
# Because of the --remove-rules in stop this action requires firewalld-0.3.8+
|
|
||||||
|
|
||||||
[INCLUDES]
|
|
||||||
|
|
||||||
before = iptables-blocktype.conf
|
|
||||||
|
|
||||||
[Definition]
|
|
||||||
|
|
||||||
actionstart = firewall-cmd --direct --add-chain ipv4 filter fail2ban-<name>
|
|
||||||
firewall-cmd --direct --add-rule ipv4 filter fail2ban-<name> 1000 -j RETURN
|
|
||||||
firewall-cmd --direct --add-rule ipv4 filter <chain> 0 -m state --state NEW -p <protocol> --dport <port> -j fail2ban-<name>
|
|
||||||
|
|
||||||
actionstop = firewall-cmd --direct --remove-rule ipv4 filter <chain> 0 -m state --state NEW -p <protocol> --dport <port> -j fail2ban-<name>
|
|
||||||
firewall-cmd --direct --remove-rules ipv4 filter fail2ban-<name>
|
|
||||||
firewall-cmd --direct --remove-chain ipv4 filter fail2ban-<name>
|
|
||||||
|
|
||||||
actioncheck = firewall-cmd --direct --get-chains ipv4 filter | grep -q 'fail2ban-<name>[ \t]'
|
|
||||||
|
|
||||||
actionban = firewall-cmd --direct --add-rule ipv4 filter fail2ban-<name> 0 -s <ip> -j <blocktype>
|
|
||||||
|
|
||||||
actionunban = firewall-cmd --direct --remove-rule ipv4 filter fail2ban-<name> 0 -s <ip> -j <blocktype>
|
|
||||||
|
|
||||||
[Init]
|
|
||||||
|
|
||||||
# Default name of the chain
|
|
||||||
#
|
|
||||||
name = default
|
|
||||||
|
|
||||||
# Option: port
|
|
||||||
# Notes.: specifies port to monitor
|
|
||||||
# Values: [ NUM | STRING ]
|
|
||||||
#
|
|
||||||
port = ssh
|
|
||||||
|
|
||||||
# Option: protocol
|
|
||||||
# Notes.: internally used by config reader for interpolations.
|
|
||||||
# Values: [ tcp | udp | icmp | all ]
|
|
||||||
#
|
|
||||||
protocol = tcp
|
|
||||||
|
|
||||||
# Option: chain
|
|
||||||
# Notes specifies the iptables chain to which the fail2ban rules should be
|
|
||||||
# added
|
|
||||||
# Values: [ STRING ]
|
|
||||||
#
|
|
||||||
chain = INPUT_direct
|
|
Loading…
Reference in New Issue