# Fail2Ban configuration file # # Author: Cyril Jaquier # Modified-By: Yaroslav Halchenko to include grepping on IP over log files # $Revision: 595 $ # [Definition] # Option: fwstart # Notes.: command executed once at the start of Fail2Ban. # Values: CMD # actionstart = echo -en "Hi,\n The jail has been started successfully.\n Regards,\n Fail2Ban"|mail -s "[Fail2Ban] : started" # Option: fwend # Notes.: command executed once at the end of Fail2Ban # Values: CMD # actionstop = echo -en "Hi,\n The jail has been stopped.\n Regards,\n Fail2Ban"|mail -s "[Fail2Ban] : stopped" # Option: fwcheck # Notes.: command executed once before each fwban command # Values: CMD # actioncheck = # Option: fwban # Notes.: command executed when banning an IP. Take care that the # command is executed with Fail2Ban user rights. # Tags: IP address # number of failures # unix timestamp of the last failure # unix timestamp of the ban time # Values: CMD # actionban = echo -en "Hi,\n The IP has just been banned by Fail2Ban after attempts against .\n\n Here are more information about :\n `whois `\n\n Lines containing IP: in \n `grep '\<\>' `\n\n Regards,\n Fail2Ban"|mail -s "[Fail2Ban] : banned " # Option: fwunban # Notes.: command executed when unbanning an IP. Take care that the # command is executed with Fail2Ban user rights. # Tags: IP address # unix timestamp of the ban time # unix timestamp of the unban time # Values: CMD # actionunban = [Init] # Defaut name of the chain # name = default # Destinataire of the mail # dest = root # Path to the log files which contain relevant lines for the abuser IP # logpath = /dev/null