Last active
June 2, 2022 03:48
-
-
Save lordofthelake/6184593 to your computer and use it in GitHub Desktop.
Fail2ban configuration
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Fail2Ban configuration file | |
# | |
# List of bad bots fetched from http://www.user-agents.org | |
# Generated on Sun Feb 11 01:09:15 EST 2007 by ./badbots.sh | |
# | |
# Author: Yaroslav Halchenko | |
# | |
# $Revision: 668 $ | |
# | |
[Definition] | |
badbotscustom = ZmEu|EmailCollector|WebEMailExtrac|TrackBack/1\.02|sogou music spider | |
badbots = atSpider/1\.0|autoemailspider|China Local Browse 2\.6|ContentSmartz|DataCha0s/2\.0|DBrowse 1\.4b|DBrowse 1\.4d|Demo Bot DOT 16b|Demo Bot Z 16b|DSurf15a 01|DSurf15a 71|DSurf15a 81|DSurf15a VA|EBrowse 1\.4b|Educate Search VxB|EmailSiphon|EmailWolf 1\.00|ESurf15a 15|ExtractorPro|Franklin Locator 1\.8|FSurf15a 01|Full Web Bot 0416B|Full Web Bot 0516B|Full Web Bot 2816B|Industry Program 1\.0\.x|ISC Systems iRc Search 2\.1|IUPUI Research Bot v 1\.9a|LARBIN-EXPERIMENTAL \(efp@gmx\.net\)|LetsCrawl\.com/1\.0 +http\://letscrawl\.com/|Lincoln State Web Browser|LWP\:\:Simple/5\.803|Mac Finder 1\.0\.xx|MFC Foundation Class Library 4\.0|Microsoft URL Control - 6\.00\.8xxx|Missauga Locate 1\.0\.0|Missigua Locator 1\.9|Missouri College Browse|Mizzu Labs 2\.2|Mo College 1\.9|Mozilla/2\.0 \(compatible; NEWT ActiveX; Win32\)|Mozilla/3\.0 \(compatible; Indy Library\)|Mozilla/4\.0 \(compatible; Advanced Email Extractor v2\.xx\)|Mozilla/4\.0 \(compatible; Iplexx Spider/1\.0 http\://www\.iplexx\.at\)|Mozilla/4\.0 \(compatible; MSIE 5\.0; Windows NT; DigExt; DTS Agent|Mozilla/4\.0 efp@gmx\.net|Mozilla/5\.0 \(Version\: xxxx Type\:xx\)|MVAClient|NASA Search 1\.0|Nsauditor/1\.x|PBrowse 1\.4b|PEval 1\.4b|Poirot|Port Huron Labs|Production Bot 0116B|Production Bot 2016B|Production Bot DOT 3016B|Program Shareware 1\.0\.2|PSurf15a 11|PSurf15a 51|PSurf15a VA|psycheclone|RSurf15a 41|RSurf15a 51|RSurf15a 81|searchbot admin@google\.com|sogou spider|sohu agent|SSurf15a 11 |TSurf15a 11|Under the Rainbow 2\.2|User-Agent\: Mozilla/4\.0 \(compatible; MSIE 6\.0; Windows NT 5\.1\)|WebVulnCrawl\.blogspot\.com/1\.0 libwww-perl/5\.803|Wells Search II|WEP Search 00 | |
# Option: failregex | |
# Notes.: Regexp to catch known spambots and software alike. Please verify | |
# that it is your intent to block IPs which were driven by | |
# abovementioned bots. | |
# Values: TEXT | |
# | |
failregex = ^<HOST> -.*"(GET|POST).*HTTP.*"(?:%(badbots)s|%(badbotscustom)s)"$ | |
# Option: ignoreregex | |
# Notes.: regex to ignore. If this regex matches, the line is ignored. | |
# Values: TEXT | |
# | |
ignoreregex = |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Fail2Ban configuration file. | |
# | |
# This file was composed for Debian systems from the original one | |
# provided now under /usr/share/doc/fail2ban/examples/jail.conf | |
# for additional examples. | |
# | |
# To avoid merges during upgrades DO NOT MODIFY THIS FILE | |
# and rather provide your changes in /etc/fail2ban/jail.local | |
# | |
# Author: Yaroslav O. Halchenko <[email protected]> | |
# | |
# $Revision: 281 $ | |
# | |
# The DEFAULT allows a global definition of the options. They can be override | |
# in each jail afterwards. | |
[DEFAULT] | |
# "ignoreip" can be an IP address, a CIDR mask or a DNS host | |
ignoreip = 127.0.0.1 | |
bantime = 600 | |
maxretry = 3 | |
# "backend" specifies the backend used to get files modification. Available | |
# options are "gamin", "polling" and "auto". | |
# yoh: For some reason Debian shipped python-gamin didn't work as expected | |
# This issue left ToDo, so polling is default backend for now | |
backend = polling | |
# | |
# Destination email address used solely for the interpolations in | |
# jail.{conf,local} configuration files. | |
destemail = root@localhost | |
# | |
# ACTIONS | |
# | |
# Default banning action (e.g. iptables, iptables-new, | |
# iptables-multiport, shorewall, etc) It is used to define | |
# action_* variables. Can be overriden globally or per | |
# section within jail.local file | |
banaction = iptables-multiport | |
# email action. Since 0.8.1 upstream fail2ban uses sendmail | |
# MTA for the mailing. Change mta configuration parameter to mail | |
# if you want to revert to conventional 'mail'. | |
mta = sendmail | |
# Default protocol | |
protocol = tcp | |
# | |
# Action shortcuts. To be used to define action parameter | |
# The simplest action to take: ban only | |
action_ = %(banaction)s[name=%(__name__)s, port="%(port)s", protocol="%(protocol)s] | |
# ban & send an e-mail with whois report to the destemail. | |
action_mw = %(banaction)s[name=%(__name__)s, port="%(port)s", protocol="%(protocol)s] | |
%(mta)s-whois[name=%(__name__)s, dest="%(destemail)s", protocol="%(protocol)s] | |
# ban & send an e-mail with whois report and relevant log lines | |
# to the destemail. | |
action_mwl = %(banaction)s[name=%(__name__)s, port="%(port)s", protocol="%(protocol)s] | |
%(mta)s-whois-lines[name=%(__name__)s, dest="%(destemail)s", logpath=%(logpath)s] | |
# Choose default action. To change, just override value of 'action' with the | |
# interpolation to the chosen action shortcut (e.g. action_mw, action_mwl, etc) in jail.local | |
# globally (section [DEFAULT]) or per specific section | |
action = %(action_)s | |
# | |
# JAILS | |
# | |
# Next jails corresponds to the standard configuration in Fail2ban 0.6 which | |
# was shipped in Debian. Enable any defined here jail by including | |
# | |
# [SECTION_NAME] | |
# enabled = true | |
# | |
# in /etc/fail2ban/jail.local. | |
# | |
# Optionally you may override any other parameter (e.g. banaction, | |
# action, port, logpath, etc) in that section within jail.local | |
[ssh] | |
enabled = true | |
port = ssh | |
filter = sshd | |
logpath = /var/log/auth.log | |
maxretry = 6 | |
# Generic filter for pam. Has to be used with action which bans all ports | |
# such as iptables-allports, shorewall | |
[pam-generic] | |
enabled = false | |
# pam-generic filter can be customized to monitor specific subset of 'tty's | |
filter = pam-generic | |
# port actually must be irrelevant but lets leave it all for some possible uses | |
port = all | |
banaction = iptables-allports | |
port = anyport | |
logpath = /var/log/auth.log | |
maxretry = 6 | |
[xinetd-fail] | |
enabled = false | |
filter = xinetd-fail | |
port = all | |
banaction = iptables-multiport-log | |
logpath = /var/log/daemon.log | |
maxretry = 2 | |
[ssh-ddos] | |
enabled = false | |
port = ssh | |
filter = sshd-ddos | |
logpath = /var/log/auth.log | |
maxretry = 6 | |
# | |
# HTTP servers | |
# | |
[apache] | |
enabled = true | |
port = http,https | |
filter = apache-auth | |
logpath = /var/log/*/*error*log | |
maxretry = 3 | |
# default action is now multiport, so apache-multiport jail was left | |
# for compatibility with previous (<0.7.6-2) releases | |
[apache-multiport] | |
enabled = true | |
port = http,https | |
filter = apache-auth | |
logpath = /var/log/*/*error*log | |
maxretry = 3 | |
[apache-noscript] | |
enabled = true | |
port = http,https | |
filter = apache-noscript | |
logpath = /var/log/*/*error*log | |
maxretry = 3 | |
[apache-overflows] | |
enabled = true | |
port = http,https | |
filter = apache-overflows | |
logpath = /var/log/*/*error*log | |
maxretry = 2 | |
[apache-badbots] | |
enabled = true | |
port = http,https | |
filter = apache-badbots | |
logpath = /var/log/*/*error*log /var/log/*/*access*log | |
maxretry = 2 | |
# | |
# FTP servers | |
# | |
[vsftpd] | |
enabled = false | |
port = ftp,ftp-data,ftps,ftps-data | |
filter = vsftpd | |
logpath = /var/log/vsftpd.log | |
# or overwrite it in jails.local to be | |
# logpath = /var/log/auth.log | |
# if you want to rely on PAM failed login attempts | |
# vsftpd's failregex should match both of those formats | |
maxretry = 6 | |
[proftpd] | |
enabled = false | |
port = ftp,ftp-data,ftps,ftps-data | |
filter = proftpd | |
logpath = /var/log/proftpd/proftpd.log | |
maxretry = 6 | |
[wuftpd] | |
enabled = false | |
port = ftp,ftp-data,ftps,ftps-data | |
filter = wuftpd | |
logpath = /var/log/auth.log | |
maxretry = 6 | |
# | |
# Mail servers | |
# | |
[postfix] | |
enabled = true | |
port = smtp,ssmtp | |
filter = postfix | |
logpath = /var/log/mail.log | |
[couriersmtp] | |
enabled = false | |
port = smtp,ssmtp | |
filter = couriersmtp | |
logpath = /var/log/mail.log | |
# | |
# Mail servers authenticators: might be used for smtp,ftp,imap servers, so | |
# all relevant ports get banned | |
# | |
[courierauth] | |
enabled = false | |
port = smtp,ssmtp,imap2,imap3,imaps,pop3,pop3s | |
filter = courierlogin | |
logpath = /var/log/mail.log | |
[sasl] | |
enabled = true | |
port = smtp,ssmtp,imap2,imap3,imaps,pop3,pop3s | |
filter = sasl | |
# You might consider monitoring /var/log/warn.log instead | |
# if you are running postfix. See http://bugs.debian.org/507990 | |
logpath = /var/log/mail.warn | |
# DNS Servers | |
# These jails block attacks against named (bind9). By default, logging is off | |
# with bind9 installation. You will need something like this: | |
# | |
# logging { | |
# channel security_file { | |
# file "/var/log/named/security.log" versions 3 size 30m; | |
# severity dynamic; | |
# print-time yes; | |
# }; | |
# category security { | |
# security_file; | |
# }; | |
# }; | |
# | |
# in your named.conf to provide proper logging | |
# !!! WARNING !!! | |
# Since UDP is connectionless protocol, spoofing of IP and immitation | |
# of illegal actions is way too simple. Thus enabling of this filter | |
# might provide an easy way for implementing a DoS against a chosen | |
# victim. See | |
# http://nion.modprobe.de/blog/archives/690-fail2ban-+-dns-fail.html | |
# Please DO NOT USE this jail unless you know what you are doing. | |
#[named-refused-udp] | |
# | |
#enabled = false | |
#port = domain,953 | |
#protocol = udp | |
#filter = named-refused | |
#logpath = /var/log/named/security.log | |
[named-refused-tcp] | |
enabled = false | |
port = domain,953 | |
protocol = tcp | |
filter = named-refused | |
logpath = /var/log/named/security.log |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment