~ubuntu-branches/ubuntu/vivid/fail2ban/vivid-proposed

« back to all changes in this revision

Viewing changes to config/jail.conf

  • Committer: Bazaar Package Importer
  • Author(s): Yaroslav Halchenko
  • Date: 2011-07-28 23:20:55 UTC
  • mfrom: (1.2.4 upstream)
  • Revision ID: james.westby@ubuntu.com-20110728232055-rv2a79rt03r6c6or
Tags: 0.8.5-1
* [de95777] Fresh upstream release FAIL2BAN-0_8_5:
  - [00e1827] BF: use addfailregex instead of failregex while processing
    per-jail "failregex" parameter (Closes: #635830) (LP: #635036)
    Thanks Marat Khayrullin for the patch and Daniel T Chen for forwarding to
    Debian.
* [1cbdafc] Set backend to auto and recommends python-gamin (Closes: #524425)
* [ef449f4] Added a note on diverting logrotate configuration for custom
  logtarget=SYSLOG (Closes: #631917).  Thanks Kenyon Ralph for report

Show diffs side-by-side

added added

removed removed

Lines of Context:
45
45
enabled  = false
46
46
filter   = sshd
47
47
action   = iptables[name=SSH, port=ssh, protocol=tcp]
48
 
           sendmail-whois[name=SSH, dest=you@mail.com, sender=fail2ban@mail.com]
 
48
           sendmail-whois[name=SSH, dest=you@example.com, sender=fail2ban@example.com]
49
49
logpath  = /var/log/sshd.log
50
50
maxretry = 5
51
51
 
54
54
enabled  = false
55
55
filter   = proftpd
56
56
action   = iptables[name=ProFTPD, port=ftp, protocol=tcp]
57
 
           sendmail-whois[name=ProFTPD, dest=you@mail.com]
 
57
           sendmail-whois[name=ProFTPD, dest=you@example.com]
58
58
logpath  = /var/log/proftpd/proftpd.log
59
59
maxretry = 6
60
60
 
66
66
filter   = sasl
67
67
backend  = polling
68
68
action   = iptables[name=sasl, port=smtp, protocol=tcp]
69
 
           sendmail-whois[name=sasl, dest=you@mail.com]
 
69
           sendmail-whois[name=sasl, dest=you@example.com]
70
70
logpath  = /var/log/mail.log
71
71
 
72
72
# Here we use TCP-Wrappers instead of Netfilter/Iptables. "ignoreregex" is
77
77
enabled     = false
78
78
filter      = sshd
79
79
action      = hostsdeny
80
 
              sendmail-whois[name=SSH, dest=you@mail.com]
 
80
              sendmail-whois[name=SSH, dest=you@example.com]
81
81
ignoreregex = for myuser from
82
82
logpath     = /var/log/sshd.log
83
83
 
101
101
enabled  = false
102
102
filter   = postfix
103
103
action   = hostsdeny[file=/not/a/standard/path/hosts.deny]
104
 
           sendmail[name=Postfix, dest=you@mail.com]
 
104
           sendmail[name=Postfix, dest=you@example.com]
105
105
logpath  = /var/log/postfix.log
106
106
bantime  = 300
107
107
 
112
112
 
113
113
enabled  = false
114
114
filter   = vsftpd
115
 
action   = sendmail-whois[name=VSFTPD, dest=you@mail.com]
 
115
action   = sendmail-whois[name=VSFTPD, dest=you@example.com]
116
116
logpath  = /var/log/vsftpd.log
117
117
maxretry = 5
118
118
bantime  = 1800
124
124
enabled  = false
125
125
filter   = vsftpd
126
126
action   = iptables[name=VSFTPD, port=ftp, protocol=tcp]
127
 
           sendmail-whois[name=VSFTPD, dest=you@mail.com]
 
127
           sendmail-whois[name=VSFTPD, dest=you@example.com]
128
128
logpath  = /var/log/vsftpd.log
129
129
maxretry = 5
130
130
bantime  = 1800
137
137
enabled  = false
138
138
filter   = apache-badbots
139
139
action   = iptables-multiport[name=BadBots, port="http,https"]
140
 
           sendmail-buffered[name=BadBots, lines=5, dest=you@mail.com]
 
140
           sendmail-buffered[name=BadBots, lines=5, dest=you@example.com]
141
141
logpath  = /var/www/*/logs/access_log
142
142
bantime  = 172800
143
143
maxretry = 1
149
149
enabled  = false
150
150
filter   = apache-noscript
151
151
action   = shorewall
152
 
           sendmail[name=Postfix, dest=you@mail.com]
 
152
           sendmail[name=Postfix, dest=you@example.com]
153
153
logpath  = /var/log/apache2/error_log
154
154
 
155
155
# Ban attackers that try to use PHP's URL-fopen() functionality
190
190
enabled  = false
191
191
filter   = sshd
192
192
action   = ipfw[localhost=192.168.0.1]
193
 
           sendmail-whois[name="SSH,IPFW", dest=you@mail.com]
 
193
           sendmail-whois[name="SSH,IPFW", dest=you@example.com]
194
194
logpath  = /var/log/auth.log
195
195
ignoreip = 168.192.0.1
196
196
 
224
224
# enabled  = false
225
225
# filter   = named-refused
226
226
# action   = iptables-multiport[name=Named, port="domain,953", protocol=udp]
227
 
#            sendmail-whois[name=Named, dest=you@mail.com]
 
227
#            sendmail-whois[name=Named, dest=you@example.com]
228
228
# logpath  = /var/log/named/security.log
229
229
# ignoreip = 168.192.0.1
230
230
 
235
235
enabled  = false
236
236
filter   = named-refused
237
237
action   = iptables-multiport[name=Named, port="domain,953", protocol=tcp]
238
 
           sendmail-whois[name=Named, dest=you@mail.com]
 
238
           sendmail-whois[name=Named, dest=you@example.com]
239
239
logpath  = /var/log/named/security.log
240
240
ignoreip = 168.192.0.1
241
241