fail2ban/config/action.d
Duncan Bellamy 9b1417a169 apply suggestions 2023-03-08 09:29:03 +00:00
..
abuseipdb.conf
apf.conf
apprise.conf
blocklist_de.conf
bsd-ipfw.conf
cloudflare-token.conf Adding jail name to notes to disambiguate between jails. 2022-05-07 20:52:39 -06:00
cloudflare.conf action.d/cloudflare.conf: better IPv6 capability 2021-01-11 15:23:40 +01:00
complain.conf fixed possible RCE vulnerability, unset escape variable (default tilde) stops consider "~" char after new-line as composing escape sequence 2021-06-21 17:12:53 +02:00
dshield.conf fixed possible RCE vulnerability, unset escape variable (default tilde) stops consider "~" char after new-line as composing escape sequence 2021-06-21 17:12:53 +02:00
dummy.conf
firewallcmd-allports.conf
firewallcmd-common.conf
firewallcmd-ipset.conf make ipset actions more breakdown-safe: start wouldn't fail if set with this name already exists (e. g. created by previous instance and don't deleted properly) 2022-01-24 22:56:16 +01:00
firewallcmd-multiport.conf Revert "`action.d/firewallcmd-*.conf` (multiport only): fixed port range selector, replacing `:` with `-`;" 2021-11-01 11:45:40 +01:00
firewallcmd-new.conf Revert "`action.d/firewallcmd-*.conf` (multiport only): fixed port range selector, replacing `:` with `-`;" 2021-11-01 11:45:40 +01:00
firewallcmd-rich-logging.conf
firewallcmd-rich-rules.conf Revert "`action.d/firewallcmd-*.conf` (multiport only): fixed port range selector, replacing `:` with `-`;" 2021-11-01 11:45:40 +01:00
helpers-common.conf
hostsdeny.conf
ipfilter.conf
ipfw.conf
iptables-allports.conf
iptables-ipset-proto4.conf iptables and iptables-ipset actions extended to support multiple protocols with single action for multiport or oneport type (back-ported from nftables action); 2022-01-26 21:51:11 +01:00
iptables-ipset-proto6-allports.conf
iptables-ipset-proto6.conf
iptables-ipset.conf iptables and iptables-ipset actions extended to support multiple protocols with single action for multiport or oneport type (back-ported from nftables action); 2022-01-26 21:51:11 +01:00
iptables-multiport-log.conf
iptables-multiport.conf
iptables-new.conf
iptables-xt_recent-echo.conf iptables and iptables-ipset actions extended to support multiple protocols with single action for multiport or oneport type (back-ported from nftables action); 2022-01-26 21:51:11 +01:00
iptables.conf iptables and iptables-ipset actions extended to support multiple protocols with single action for multiport or oneport type (back-ported from nftables action); 2022-01-26 21:51:11 +01:00
ipthreat.conf IPThreat integration (#3349) 2022-09-13 11:01:46 +02:00
mail-buffered.conf fixed possible RCE vulnerability, unset escape variable (default tilde) stops consider "~" char after new-line as composing escape sequence 2021-06-21 17:12:53 +02:00
mail-whois-common.conf
mail-whois-lines.conf fixed possible RCE vulnerability, unset escape variable (default tilde) stops consider "~" char after new-line as composing escape sequence 2021-06-21 17:12:53 +02:00
mail-whois.conf fixed possible RCE vulnerability, unset escape variable (default tilde) stops consider "~" char after new-line as composing escape sequence 2021-06-21 17:12:53 +02:00
mail.conf fixed possible RCE vulnerability, unset escape variable (default tilde) stops consider "~" char after new-line as composing escape sequence 2021-06-21 17:12:53 +02:00
mikrotik.conf apply suggestions 2023-03-08 09:29:03 +00:00
mynetwatchman.conf
netscaler.conf
nftables-allports.conf
nftables-multiport.conf
nftables.conf
nginx-block-map.conf `action.d/nginx-block-map.conf`: reload nginx only if it is running (also avoid error in nginx-errorlog, gh-2949) and better test coverage for the action 2021-02-24 18:21:42 +01:00
npf.conf
nsupdate.conf
osx-afctl.conf
osx-ipfw.conf
pf.conf
route.conf
sendmail-buffered.conf
sendmail-common.conf
sendmail-geoip-lines.conf
sendmail-whois-ipjailmatches.conf
sendmail-whois-ipmatches.conf
sendmail-whois-lines.conf
sendmail-whois-matches.conf
sendmail-whois.conf
sendmail.conf
shorewall-ipset-proto6.conf
shorewall.conf
smtp.py
symbiosis-blacklist-allports.conf
ufw.conf action.d/ufw.conf: amend to #3018: parameter `kill-mode` extended with conntrack 2021-06-03 12:02:08 +02:00
xarf-login-attack.conf