From 65b2d1146503948856ce4cd09d7657820a5e355d Mon Sep 17 00:00:00 2001 From: caskd Date: Sun, 2 Feb 2020 17:18:00 +0100 Subject: [PATCH] Initial commit --- fail2ban.local | 45 +++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 45 insertions(+) create mode 100644 fail2ban.local diff --git a/fail2ban.local b/fail2ban.local new file mode 100644 index 0000000..56d0235 --- /dev/null +++ b/fail2ban.local @@ -0,0 +1,45 @@ +[INCLUDES] +before = paths-debian.conf + +[DEFAULT] +ignorecommand = +bantime = 1h +findtime = 10m +maxretry = 5 +backend = auto +usedns = warn +logencoding = auto +enabled = false +mode = normal +filter = %(__name__)s[mode=%(mode)s] + +protocol = tcp +chain = +port = 0:65535 +fail2ban_agent = Fail2Ban/%(fail2ban_version)s +banaction = iptables-multiport +banaction_allports = iptables-allports +action_ = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"] +action_blocklist_de = blocklist_de[email="%(sender)s", service=%(filter)s, apikey="%(blocklist_de_apikey)s", agent="%(fail2ban_agent)s"] +action_badips = badips.py[category="%(__name__)s", banaction="%(banaction)s", agent="%(fail2ban_agent)s"] +action_badips_report = badips[category="%(__name__)s", agent="%(fail2ban_agent)s"] +action_abuseipdb = abuseipdb +action = %(action_)s + +[sshd] +port = ssh +logpath = %(sshd_log)s +backend = %(sshd_backend)s +enabled = true + +[dropbear] + +port = ssh +logpath = %(dropbear_log)s +backend = %(dropbear_backend)s + + +[selinux-ssh] + +port = ssh +logpath = %(auditd_log)s