fail2ban/config/action.d
sebres 3d7e3bc2fb make ipset actions more breakdown-safe: start wouldn't fail if set with this name already exists (e. g. created by previous instance and don't deleted properly) 2022-01-24 22:56:16 +01:00
..
abuseipdb.conf action.d/abuseipdb.conf: removed broken link, simplified usage example, fixed typos 2020-09-17 12:39:08 +02:00
apf.conf
apprise.conf involve config parameter (replaces hard-coded path); fixed typo in actionban (looks like copy&paste from trimmed tty) 2020-09-02 20:47:05 +02:00
blocklist_de.conf action.d/*.conf: correct comments for actionstart/actionstop 2018-09-12 16:01:57 +02:00
bsd-ipfw.conf `action.d/bsd-ipfw.conf`: small amend (gh-2836) simplifying awk condition/code (position starts from `<lowest_rule_num>` and increases whilst used) 2020-09-29 13:33:40 +02:00
cloudflare.conf action.d/cloudflare.conf: better IPv6 capability 2021-01-11 15:23:40 +01:00
complain.conf fixed possible RCE vulnerability, unset escape variable (default tilde) stops consider "~" char after new-line as composing escape sequence 2021-06-21 17:12:53 +02:00
dshield.conf fixed possible RCE vulnerability, unset escape variable (default tilde) stops consider "~" char after new-line as composing escape sequence 2021-06-21 17:12:53 +02:00
dummy.conf action.d/*.conf: correct comments for actionstart/actionstop 2018-09-12 16:01:57 +02:00
firewallcmd-allports.conf
firewallcmd-common.conf
firewallcmd-ipset.conf make ipset actions more breakdown-safe: start wouldn't fail if set with this name already exists (e. g. created by previous instance and don't deleted properly) 2022-01-24 22:56:16 +01:00
firewallcmd-multiport.conf Revert "`action.d/firewallcmd-*.conf` (multiport only): fixed port range selector, replacing `:` with `-`;" 2021-11-01 11:45:40 +01:00
firewallcmd-new.conf Revert "`action.d/firewallcmd-*.conf` (multiport only): fixed port range selector, replacing `:` with `-`;" 2021-11-01 11:45:40 +01:00
firewallcmd-rich-logging.conf `action.d/firewallcmd-*.conf` (multiport only): fixed port range selector, replacing `:` with `-`; 2020-09-03 16:41:23 +02:00
firewallcmd-rich-rules.conf Revert "`action.d/firewallcmd-*.conf` (multiport only): fixed port range selector, replacing `:` with `-`;" 2021-11-01 11:45:40 +01:00
helpers-common.conf action.d/helpers-common.conf: grep arguments are rewritten - using options `-wF` to match only whole words and fixed string (not as pattern) 2019-05-10 16:17:13 +02:00
hostsdeny.conf action.d/*.conf: correct comments for actionstart/actionstop 2018-09-12 16:01:57 +02:00
ipfilter.conf action.d/*.conf: correct comments for actionstart/actionstop 2018-09-12 16:01:57 +02:00
ipfw.conf action.d/*.conf: correct comments for actionstart/actionstop 2018-09-12 16:01:57 +02:00
iptables-allports.conf first attempt to make certain standard actions breakdown safe starting with iptables: 2020-02-14 12:16:25 +01:00
iptables-ipset-proto4.conf replace internals of several iptables-ipset actions using internals of iptables include: 2020-02-14 12:16:26 +01:00
iptables-ipset-proto6-allports.conf Merge branch '0.10' into 0.11 2020-08-04 15:40:59 +02:00
iptables-ipset-proto6.conf Merge branch '0.10' into 0.11 2020-08-04 15:40:59 +02:00
iptables-ipset.conf make ipset actions more breakdown-safe: start wouldn't fail if set with this name already exists (e. g. created by previous instance and don't deleted properly) 2022-01-24 22:56:16 +01:00
iptables-multiport-log.conf first attempt to make certain standard actions breakdown safe starting with iptables: 2020-02-14 12:16:25 +01:00
iptables-multiport.conf first attempt to make certain standard actions breakdown safe starting with iptables: 2020-02-14 12:16:25 +01:00
iptables-new.conf first attempt to make certain standard actions breakdown safe starting with iptables: 2020-02-14 12:16:25 +01:00
iptables-xt_recent-echo.conf first attempt to make certain standard actions breakdown safe starting with iptables: 2020-02-14 12:16:25 +01:00
iptables.conf Merge remote-tracking branch 'remotes/sebres/1.0-breakdown-safe-actions' with master; 2022-01-24 22:31:51 +01:00
mail-buffered.conf fixed possible RCE vulnerability, unset escape variable (default tilde) stops consider "~" char after new-line as composing escape sequence 2021-06-21 17:12:53 +02:00
mail-whois-common.conf normalize, simplify and fix several mail actions (mail and sendmail actions are more similar now, sendmail is configurable via parameter `mailcmd`, etc); 2019-06-15 23:14:41 +02:00
mail-whois-lines.conf fixed possible RCE vulnerability, unset escape variable (default tilde) stops consider "~" char after new-line as composing escape sequence 2021-06-21 17:12:53 +02:00
mail-whois.conf fixed possible RCE vulnerability, unset escape variable (default tilde) stops consider "~" char after new-line as composing escape sequence 2021-06-21 17:12:53 +02:00
mail.conf fixed possible RCE vulnerability, unset escape variable (default tilde) stops consider "~" char after new-line as composing escape sequence 2021-06-21 17:12:53 +02:00
mynetwatchman.conf action.d/*.conf: correct comments for actionstart/actionstop 2018-09-12 16:01:57 +02:00
netscaler.conf
nftables-allports.conf combine nftables actions to single action: 2019-09-24 18:53:38 +02:00
nftables-multiport.conf combine nftables actions to single action: 2019-09-24 18:53:38 +02:00
nftables.conf action.d/nftables.conf (type=multiport only): fixed port range selector (replacing `:` with `-`) 2020-06-24 19:20:36 +02:00
nginx-block-map.conf `action.d/nginx-block-map.conf`: reload nginx only if it is running (also avoid error in nginx-errorlog, gh-2949) and better test coverage for the action 2021-02-24 18:21:42 +01:00
npf.conf action.d/*.conf: correct comments for actionstart/actionstop 2018-09-12 16:01:57 +02:00
nsupdate.conf action.d/*.conf: correct comments for actionstart/actionstop 2018-09-12 16:01:57 +02:00
osx-afctl.conf
osx-ipfw.conf action.d/*.conf: correct comments for actionstart/actionstop 2018-09-12 16:01:57 +02:00
pf.conf action.d/*.conf: correct comments for actionstart/actionstop 2018-09-12 16:01:57 +02:00
route.conf
sendmail-buffered.conf normalize, simplify and fix several mail actions (mail and sendmail actions are more similar now, sendmail is configurable via parameter `mailcmd`, etc); 2019-06-15 23:14:41 +02:00
sendmail-common.conf normalize, simplify and fix several mail actions (mail and sendmail actions are more similar now, sendmail is configurable via parameter `mailcmd`, etc); 2019-06-15 23:14:41 +02:00
sendmail-geoip-lines.conf normalize, simplify and fix several mail actions (mail and sendmail actions are more similar now, sendmail is configurable via parameter `mailcmd`, etc); 2019-06-15 23:14:41 +02:00
sendmail-whois-ipjailmatches.conf normalize, simplify and fix several mail actions (mail and sendmail actions are more similar now, sendmail is configurable via parameter `mailcmd`, etc); 2019-06-15 23:14:41 +02:00
sendmail-whois-ipmatches.conf normalize, simplify and fix several mail actions (mail and sendmail actions are more similar now, sendmail is configurable via parameter `mailcmd`, etc); 2019-06-15 23:14:41 +02:00
sendmail-whois-lines.conf normalize, simplify and fix several mail actions (mail and sendmail actions are more similar now, sendmail is configurable via parameter `mailcmd`, etc); 2019-06-15 23:14:41 +02:00
sendmail-whois-matches.conf normalize, simplify and fix several mail actions (mail and sendmail actions are more similar now, sendmail is configurable via parameter `mailcmd`, etc); 2019-06-15 23:14:41 +02:00
sendmail-whois.conf normalize, simplify and fix several mail actions (mail and sendmail actions are more similar now, sendmail is configurable via parameter `mailcmd`, etc); 2019-06-15 23:14:41 +02:00
sendmail.conf normalize, simplify and fix several mail actions (mail and sendmail actions are more similar now, sendmail is configurable via parameter `mailcmd`, etc); 2019-06-15 23:14:41 +02:00
shorewall-ipset-proto6.conf Merge branch '0.10' into 0.11 2020-08-04 15:40:59 +02:00
shorewall.conf Merge remote-tracking branch 'remotes/gh-upstream/master' into 0.10 2018-11-21 13:05:42 +01:00
smtp.py coverage: try to avoid sporadic "coverage decreased" in CI 2019-02-22 13:20:40 +01:00
symbiosis-blacklist-allports.conf first attempt to make certain standard actions breakdown safe starting with iptables: 2020-02-14 12:16:25 +01:00
ufw.conf action.d/ufw.conf: amend to #3018: parameter `kill-mode` extended with conntrack 2021-06-03 12:02:08 +02:00
xarf-login-attack.conf action.d/xarf-login-attack.conf: fixes gh-2372, correction for split of addresses, interpolation is shell-independent now, etc; 2019-03-16 00:05:06 +01:00