fail2ban.jail.conf 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855
  1. #
  2. # WARNING: heavily refactored in 0.9.0 release. Please review and
  3. # customize settings for your setup.
  4. #
  5. # Changes: in most of the cases you should not modify this
  6. # file, but provide customizations in jail.local file,
  7. # or separate .conf files under jail.d/ directory, e.g.:
  8. #
  9. # HOW TO ACTIVATE JAILS:
  10. #
  11. # YOU SHOULD NOT MODIFY THIS FILE.
  12. #
  13. # It will probably be overwritten or improved in a distribution update.
  14. #
  15. # Provide customizations in a jail.local file or a jail.d/customisation.local.
  16. # For example to change the default bantime for all jails and to enable the
  17. # ssh-iptables jail the following (uncommented) would appear in the .local file.
  18. # See man 5 jail.conf for details.
  19. #
  20. # [DEFAULT]
  21. # bantime = 3600
  22. #
  23. # [sshd]
  24. # enabled = true
  25. #
  26. # See jail.conf(5) man page for more information
  27. # Comments: use '#' for comment lines and ';' (following a space) for inline comments
  28. [INCLUDES]
  29. #before = paths-distro.conf
  30. before = paths-debian.conf
  31. # The DEFAULT allows a global definition of the options. They can be overridden
  32. # in each jail afterwards.
  33. [DEFAULT]
  34. #
  35. # MISCELLANEOUS OPTIONS
  36. #
  37. # "ignoreip" can be an IP address, a CIDR mask or a DNS host. Fail2ban will not
  38. # ban a host which matches an address in this list. Several addresses can be
  39. # defined using space (and/or comma) separator.
  40. ignoreip = 127.0.0.1/8
  41. # External command that will take an tagged arguments to ignore, e.g. <ip>,
  42. # and return true if the IP is to be ignored. False otherwise.
  43. #
  44. # ignorecommand = /path/to/command <ip>
  45. ignorecommand =
  46. # "bantime" is the number of seconds that a host is banned.
  47. bantime = 600
  48. # A host is banned if it has generated "maxretry" during the last "findtime"
  49. # seconds.
  50. findtime = 600
  51. # "maxretry" is the number of failures before a host get banned.
  52. maxretry = 5
  53. # "backend" specifies the backend used to get files modification.
  54. # Available options are "pyinotify", "gamin", "polling", "systemd" and "auto".
  55. # This option can be overridden in each jail as well.
  56. #
  57. # pyinotify: requires pyinotify (a file alteration monitor) to be installed.
  58. # If pyinotify is not installed, Fail2ban will use auto.
  59. # gamin: requires Gamin (a file alteration monitor) to be installed.
  60. # If Gamin is not installed, Fail2ban will use auto.
  61. # polling: uses a polling algorithm which does not require external libraries.
  62. # systemd: uses systemd python library to access the systemd journal.
  63. # Specifying "logpath" is not valid for this backend.
  64. # See "journalmatch" in the jails associated filter config
  65. # auto: will try to use the following backends, in order:
  66. # pyinotify, gamin, polling.
  67. #
  68. # Note: if systemd backend is chosen as the default but you enable a jail
  69. # for which logs are present only in its own log files, specify some other
  70. # backend for that jail (e.g. polling) and provide empty value for
  71. # journalmatch. See https://github.com/fail2ban/fail2ban/issues/959#issuecomment-74901200
  72. backend = auto
  73. # "usedns" specifies if jails should trust hostnames in logs,
  74. # warn when DNS lookups are performed, or ignore all hostnames in logs
  75. #
  76. # yes: if a hostname is encountered, a DNS lookup will be performed.
  77. # warn: if a hostname is encountered, a DNS lookup will be performed,
  78. # but it will be logged as a warning.
  79. # no: if a hostname is encountered, will not be used for banning,
  80. # but it will be logged as info.
  81. # raw: use raw value (no hostname), allow use it for no-host filters/actions (example user)
  82. usedns = warn
  83. # "logencoding" specifies the encoding of the log files handled by the jail
  84. # This is used to decode the lines from the log file.
  85. # Typical examples: "ascii", "utf-8"
  86. #
  87. # auto: will use the system locale setting
  88. logencoding = auto
  89. # "enabled" enables the jails.
  90. # By default all jails are disabled, and it should stay this way.
  91. # Enable only relevant to your setup jails in your .local or jail.d/*.conf
  92. #
  93. # true: jail will be enabled and log files will get monitored for changes
  94. # false: jail is not enabled
  95. enabled = false
  96. # "filter" defines the filter to use by the jail.
  97. # By default jails have names matching their filter name
  98. #
  99. filter = %(__name__)s
  100. #
  101. # ACTIONS
  102. #
  103. # Some options used for actions
  104. # Destination email address used solely for the interpolations in
  105. # jail.{conf,local,d/*} configuration files.
  106. destemail = root@localhost
  107. # Sender email address used solely for some actions
  108. sender = root@localhost
  109. # E-mail action. Since 0.8.1 Fail2Ban uses sendmail MTA for the
  110. # mailing. Change mta configuration parameter to mail if you want to
  111. # revert to conventional 'mail'.
  112. mta = sendmail
  113. # Default protocol
  114. protocol = tcp
  115. # Specify chain where jumps would need to be added in iptables-* actions
  116. chain = INPUT
  117. # Ports to be banned
  118. # Usually should be overridden in a particular jail
  119. port = 0:65535
  120. # Format of user-agent https://tools.ietf.org/html/rfc7231#section-5.5.3
  121. fail2ban_agent = Fail2Ban/%(fail2ban_version)s
  122. #
  123. # Action shortcuts. To be used to define action parameter
  124. # Default banning action (e.g. iptables, iptables-new,
  125. # iptables-multiport, shorewall, etc) It is used to define
  126. # action_* variables. Can be overridden globally or per
  127. # section within jail.local file
  128. banaction = iptables-multiport
  129. banaction_allports = iptables-allports
  130. # The simplest action to take: ban only
  131. action_ = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
  132. # ban & send an e-mail with whois report to the destemail.
  133. action_mw = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
  134. %(mta)s-whois[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", protocol="%(protocol)s", chain="%(chain)s"]
  135. # ban & send an e-mail with whois report and relevant log lines
  136. # to the destemail.
  137. action_mwl = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
  138. %(mta)s-whois-lines[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", logpath=%(logpath)s, chain="%(chain)s"]
  139. # See the IMPORTANT note in action.d/xarf-login-attack for when to use this action
  140. #
  141. # ban & send a xarf e-mail to abuse contact of IP address and include relevant log lines
  142. # to the destemail.
  143. action_xarf = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
  144. xarf-login-attack[service=%(__name__)s, sender="%(sender)s", logpath=%(logpath)s, port="%(port)s"]
  145. # ban IP on CloudFlare & send an e-mail with whois report and relevant log lines
  146. # to the destemail.
  147. action_cf_mwl = cloudflare[cfuser="%(cfemail)s", cftoken="%(cfapikey)s"]
  148. %(mta)s-whois-lines[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", logpath=%(logpath)s, chain="%(chain)s"]
  149. # Report block via blocklist.de fail2ban reporting service API
  150. #
  151. # See the IMPORTANT note in action.d/blocklist_de.conf for when to
  152. # use this action. Create a file jail.d/blocklist_de.local containing
  153. # [Init]
  154. # blocklist_de_apikey = {api key from registration]
  155. #
  156. action_blocklist_de = blocklist_de[email="%(sender)s", service=%(filter)s, apikey="%(blocklist_de_apikey)s", agent="%(fail2ban_agent)s"]
  157. # Report ban via badips.com, and use as blacklist
  158. #
  159. # See BadIPsAction docstring in config/action.d/badips.py for
  160. # documentation for this action.
  161. #
  162. # NOTE: This action relies on banaction being present on start and therefore
  163. # should be last action defined for a jail.
  164. #
  165. action_badips = badips.py[category="%(__name__)s", banaction="%(banaction)s", agent="%(fail2ban_agent)s"]
  166. #
  167. # Report ban via badips.com (uses action.d/badips.conf for reporting only)
  168. #
  169. action_badips_report = badips[category="%(__name__)s", agent="%(fail2ban_agent)s"]
  170. # Choose default action. To change, just override value of 'action' with the
  171. # interpolation to the chosen action shortcut (e.g. action_mw, action_mwl, etc) in jail.local
  172. # globally (section [DEFAULT]) or per specific section
  173. action = %(action_)s
  174. #
  175. # JAILS
  176. #
  177. #
  178. # SSH servers
  179. #
  180. [sshd]
  181. port = ssh
  182. logpath = %(sshd_log)s
  183. backend = %(sshd_backend)s
  184. [sshd-ddos]
  185. # This jail corresponds to the standard configuration in Fail2ban.
  186. # The mail-whois action send a notification e-mail with a whois request
  187. # in the body.
  188. port = ssh
  189. logpath = %(sshd_log)s
  190. backend = %(sshd_backend)s
  191. [dropbear]
  192. port = ssh
  193. logpath = %(dropbear_log)s
  194. backend = %(dropbear_backend)s
  195. [selinux-ssh]
  196. port = ssh
  197. logpath = %(auditd_log)s
  198. #
  199. # HTTP servers
  200. #
  201. [apache-auth]
  202. port = http,https
  203. logpath = %(apache_error_log)s
  204. [apache-badbots]
  205. # Ban hosts which agent identifies spammer robots crawling the web
  206. # for email addresses. The mail outputs are buffered.
  207. port = http,https
  208. logpath = %(apache_access_log)s
  209. bantime = 172800
  210. maxretry = 1
  211. [apache-noscript]
  212. port = http,https
  213. logpath = %(apache_error_log)s
  214. [apache-overflows]
  215. port = http,https
  216. logpath = %(apache_error_log)s
  217. maxretry = 2
  218. [apache-nohome]
  219. port = http,https
  220. logpath = %(apache_error_log)s
  221. maxretry = 2
  222. [apache-botsearch]
  223. port = http,https
  224. logpath = %(apache_error_log)s
  225. maxretry = 2
  226. [apache-fakegooglebot]
  227. port = http,https
  228. logpath = %(apache_access_log)s
  229. maxretry = 1
  230. ignorecommand = %(ignorecommands_dir)s/apache-fakegooglebot <ip>
  231. [apache-modsecurity]
  232. port = http,https
  233. logpath = %(apache_error_log)s
  234. maxretry = 2
  235. [apache-shellshock]
  236. port = http,https
  237. logpath = %(apache_error_log)s
  238. maxretry = 1
  239. [openhab-auth]
  240. filter = openhab
  241. action = iptables-allports[name=NoAuthFailures]
  242. logpath = /opt/openhab/logs/request.log
  243. [nginx-http-auth]
  244. port = http,https
  245. logpath = %(nginx_error_log)s
  246. # To use 'nginx-limit-req' jail you should have `ngx_http_limit_req_module`
  247. # and define `limit_req` and `limit_req_zone` as described in nginx documentation
  248. # http://nginx.org/en/docs/http/ngx_http_limit_req_module.html
  249. # or for example see in 'config/filter.d/nginx-limit-req.conf'
  250. [nginx-limit-req]
  251. port = http,https
  252. logpath = %(nginx_error_log)s
  253. [nginx-botsearch]
  254. port = http,https
  255. logpath = %(nginx_error_log)s
  256. maxretry = 2
  257. # Ban attackers that try to use PHP's URL-fopen() functionality
  258. # through GET/POST variables. - Experimental, with more than a year
  259. # of usage in production environments.
  260. [php-url-fopen]
  261. port = http,https
  262. logpath = %(nginx_access_log)s
  263. %(apache_access_log)s
  264. [suhosin]
  265. port = http,https
  266. logpath = %(suhosin_log)s
  267. [lighttpd-auth]
  268. # Same as above for Apache's mod_auth
  269. # It catches wrong authentifications
  270. port = http,https
  271. logpath = %(lighttpd_error_log)s
  272. #
  273. # Webmail and groupware servers
  274. #
  275. [roundcube-auth]
  276. port = http,https
  277. logpath = %(roundcube_errors_log)s
  278. [openwebmail]
  279. port = http,https
  280. logpath = /var/log/openwebmail.log
  281. [horde]
  282. port = http,https
  283. logpath = /var/log/horde/horde.log
  284. [groupoffice]
  285. port = http,https
  286. logpath = /home/groupoffice/log/info.log
  287. [sogo-auth]
  288. # Monitor SOGo groupware server
  289. # without proxy this would be:
  290. # port = 20000
  291. port = http,https
  292. logpath = /var/log/sogo/sogo.log
  293. [tine20]
  294. logpath = /var/log/tine20/tine20.log
  295. port = http,https
  296. #
  297. # Web Applications
  298. #
  299. #
  300. [drupal-auth]
  301. port = http,https
  302. logpath = %(syslog_daemon)s
  303. backend = %(syslog_backend)s
  304. [guacamole]
  305. port = http,https
  306. logpath = /var/log/tomcat*/catalina.out
  307. [monit]
  308. #Ban clients brute-forcing the monit gui login
  309. port = 2812
  310. logpath = /var/log/monit
  311. [webmin-auth]
  312. port = 10000
  313. logpath = %(syslog_authpriv)s
  314. backend = %(syslog_backend)s
  315. [froxlor-auth]
  316. port = http,https
  317. logpath = %(syslog_authpriv)s
  318. backend = %(syslog_backend)s
  319. #
  320. # HTTP Proxy servers
  321. #
  322. #
  323. [squid]
  324. port = 80,443,3128,8080
  325. logpath = /var/log/squid/access.log
  326. [3proxy]
  327. port = 3128
  328. logpath = /var/log/3proxy.log
  329. #
  330. # FTP servers
  331. #
  332. [proftpd]
  333. port = ftp,ftp-data,ftps,ftps-data
  334. logpath = %(proftpd_log)s
  335. backend = %(proftpd_backend)s
  336. [pure-ftpd]
  337. port = ftp,ftp-data,ftps,ftps-data
  338. logpath = %(pureftpd_log)s
  339. backend = %(pureftpd_backend)s
  340. [gssftpd]
  341. port = ftp,ftp-data,ftps,ftps-data
  342. logpath = %(syslog_daemon)s
  343. backend = %(syslog_backend)s
  344. [wuftpd]
  345. port = ftp,ftp-data,ftps,ftps-data
  346. logpath = %(wuftpd_log)s
  347. backend = %(wuftpd_backend)s
  348. [vsftpd]
  349. # or overwrite it in jails.local to be
  350. # logpath = %(syslog_authpriv)s
  351. # if you want to rely on PAM failed login attempts
  352. # vsftpd's failregex should match both of those formats
  353. port = ftp,ftp-data,ftps,ftps-data
  354. logpath = %(vsftpd_log)s
  355. #
  356. # Mail servers
  357. #
  358. # ASSP SMTP Proxy Jail
  359. [assp]
  360. port = smtp,465,submission
  361. logpath = /root/path/to/assp/logs/maillog.txt
  362. [courier-smtp]
  363. port = smtp,465,submission
  364. logpath = %(syslog_mail)s
  365. backend = %(syslog_backend)s
  366. [postfix]
  367. port = smtp,465,submission
  368. logpath = %(postfix_log)s
  369. backend = %(postfix_backend)s
  370. [postfix-rbl]
  371. port = smtp,465,submission
  372. logpath = %(postfix_log)s
  373. backend = %(postfix_backend)s
  374. maxretry = 1
  375. [sendmail-auth]
  376. port = submission,465,smtp
  377. logpath = %(syslog_mail)s
  378. backend = %(syslog_backend)s
  379. [sendmail-reject]
  380. port = smtp,465,submission
  381. logpath = %(syslog_mail)s
  382. backend = %(syslog_backend)s
  383. [qmail-rbl]
  384. filter = qmail
  385. port = smtp,465,submission
  386. logpath = /service/qmail/log/main/current
  387. # dovecot defaults to logging to the mail syslog facility
  388. # but can be set by syslog_facility in the dovecot configuration.
  389. [dovecot]
  390. port = pop3,pop3s,imap,imaps,submission,465,sieve
  391. logpath = %(dovecot_log)s
  392. backend = %(dovecot_backend)s
  393. [sieve]
  394. port = smtp,465,submission
  395. logpath = %(dovecot_log)s
  396. backend = %(dovecot_backend)s
  397. [solid-pop3d]
  398. port = pop3,pop3s
  399. logpath = %(solidpop3d_log)s
  400. [exim]
  401. port = smtp,465,submission
  402. logpath = %(exim_main_log)s
  403. [exim-spam]
  404. port = smtp,465,submission
  405. logpath = %(exim_main_log)s
  406. [kerio]
  407. port = imap,smtp,imaps,465
  408. logpath = /opt/kerio/mailserver/store/logs/security.log
  409. #
  410. # Mail servers authenticators: might be used for smtp,ftp,imap servers, so
  411. # all relevant ports get banned
  412. #
  413. [courier-auth]
  414. port = smtp,465,submission,imap3,imaps,pop3,pop3s
  415. logpath = %(syslog_mail)s
  416. backend = %(syslog_backend)s
  417. [postfix-sasl]
  418. port = smtp,465,submission,imap3,imaps,pop3,pop3s
  419. # You might consider monitoring /var/log/mail.warn instead if you are
  420. # running postfix since it would provide the same log lines at the
  421. # "warn" level but overall at the smaller filesize.
  422. logpath = %(postfix_log)s
  423. backend = %(postfix_backend)s
  424. [perdition]
  425. port = imap3,imaps,pop3,pop3s
  426. logpath = %(syslog_mail)s
  427. backend = %(syslog_backend)s
  428. [squirrelmail]
  429. port = smtp,465,submission,imap2,imap3,imaps,pop3,pop3s,http,https,socks
  430. logpath = /var/lib/squirrelmail/prefs/squirrelmail_access_log
  431. [cyrus-imap]
  432. port = imap3,imaps
  433. logpath = %(syslog_mail)s
  434. backend = %(syslog_backend)s
  435. [uwimap-auth]
  436. port = imap3,imaps
  437. logpath = %(syslog_mail)s
  438. backend = %(syslog_backend)s
  439. #
  440. #
  441. # DNS servers
  442. #
  443. # !!! WARNING !!!
  444. # Since UDP is connection-less protocol, spoofing of IP and imitation
  445. # of illegal actions is way too simple. Thus enabling of this filter
  446. # might provide an easy way for implementing a DoS against a chosen
  447. # victim. See
  448. # http://nion.modprobe.de/blog/archives/690-fail2ban-+-dns-fail.html
  449. # Please DO NOT USE this jail unless you know what you are doing.
  450. #
  451. # IMPORTANT: see filter.d/named-refused for instructions to enable logging
  452. # This jail blocks UDP traffic for DNS requests.
  453. # [named-refused-udp]
  454. #
  455. # filter = named-refused
  456. # port = domain,953
  457. # protocol = udp
  458. # logpath = /var/log/named/security.log
  459. # IMPORTANT: see filter.d/named-refused for instructions to enable logging
  460. # This jail blocks TCP traffic for DNS requests.
  461. [named-refused]
  462. port = domain,953
  463. logpath = /var/log/named/security.log
  464. [nsd]
  465. port = 53
  466. action = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
  467. %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
  468. logpath = /var/log/nsd.log
  469. #
  470. # Miscellaneous
  471. #
  472. [asterisk]
  473. port = 5060,5061
  474. action = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
  475. %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
  476. %(mta)s-whois[name=%(__name__)s, dest="%(destemail)s"]
  477. logpath = /var/log/asterisk/messages
  478. maxretry = 10
  479. [freeswitch]
  480. port = 5060,5061
  481. action = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
  482. %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
  483. %(mta)s-whois[name=%(__name__)s, dest="%(destemail)s"]
  484. logpath = /var/log/freeswitch.log
  485. maxretry = 10
  486. # To log wrong MySQL access attempts add to /etc/my.cnf in [mysqld] or
  487. # equivalent section:
  488. # log-warning = 2
  489. #
  490. # for syslog (daemon facility)
  491. # [mysqld_safe]
  492. # syslog
  493. #
  494. # for own logfile
  495. # [mysqld]
  496. # log-error=/var/log/mysqld.log
  497. [mysqld-auth]
  498. port = 3306
  499. logpath = %(mysql_log)s
  500. backend = %(mysql_backend)s
  501. # Log wrong MongoDB auth (for details see filter 'filter.d/mongodb-auth.conf')
  502. [mongodb-auth]
  503. # change port when running with "--shardsvr" or "--configsvr" runtime operation
  504. port = 27017
  505. logpath = /var/log/mongodb/mongodb.log
  506. # Jail for more extended banning of persistent abusers
  507. # !!! WARNINGS !!!
  508. # 1. Make sure that your loglevel specified in fail2ban.conf/.local
  509. # is not at DEBUG level -- which might then cause fail2ban to fall into
  510. # an infinite loop constantly feeding itself with non-informative lines
  511. # 2. Increase dbpurgeage defined in fail2ban.conf to e.g. 648000 (7.5 days)
  512. # to maintain entries for failed logins for sufficient amount of time
  513. [recidive]
  514. logpath = /var/log/fail2ban.log
  515. banaction = %(banaction_allports)s
  516. bantime = 604800 ; 1 week
  517. findtime = 86400 ; 1 day
  518. # Generic filter for PAM. Has to be used with action which bans all
  519. # ports such as iptables-allports, shorewall
  520. [pam-generic]
  521. # pam-generic filter can be customized to monitor specific subset of 'tty's
  522. banaction = %(banaction_allports)s
  523. logpath = %(syslog_authpriv)s
  524. backend = %(syslog_backend)s
  525. [xinetd-fail]
  526. banaction = iptables-multiport-log
  527. logpath = %(syslog_daemon)s
  528. backend = %(syslog_backend)s
  529. maxretry = 2
  530. # stunnel - need to set port for this
  531. [stunnel]
  532. logpath = /var/log/stunnel4/stunnel.log
  533. [ejabberd-auth]
  534. port = 5222
  535. logpath = /var/log/ejabberd/ejabberd.log
  536. [counter-strike]
  537. logpath = /opt/cstrike/logs/L[0-9]*.log
  538. # Firewall: http://www.cstrike-planet.com/faq/6
  539. tcpport = 27030,27031,27032,27033,27034,27035,27036,27037,27038,27039
  540. udpport = 1200,27000,27001,27002,27003,27004,27005,27006,27007,27008,27009,27010,27011,27012,27013,27014,27015
  541. action = %(banaction)s[name=%(__name__)s-tcp, port="%(tcpport)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
  542. %(banaction)s[name=%(__name__)s-udp, port="%(udpport)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
  543. # consider low maxretry and a long bantime
  544. # nobody except your own Nagios server should ever probe nrpe
  545. [nagios]
  546. logpath = %(syslog_daemon)s ; nrpe.cfg may define a different log_facility
  547. backend = %(syslog_backend)s
  548. maxretry = 1
  549. [oracleims]
  550. # see "oracleims" filter file for configuration requirement for Oracle IMS v6 and above
  551. logpath = /opt/sun/comms/messaging64/log/mail.log_current
  552. banaction = %(banaction_allports)s
  553. [directadmin]
  554. logpath = /var/log/directadmin/login.log
  555. port = 2222
  556. [portsentry]
  557. logpath = /var/lib/portsentry/portsentry.history
  558. maxretry = 1
  559. [pass2allow-ftp]
  560. # this pass2allow example allows FTP traffic after successful HTTP authentication
  561. port = ftp,ftp-data,ftps,ftps-data
  562. # knocking_url variable must be overridden to some secret value in jail.local
  563. knocking_url = /knocking/
  564. filter = apache-pass[knocking_url="%(knocking_url)s"]
  565. # access log of the website with HTTP auth
  566. logpath = %(apache_access_log)s
  567. blocktype = RETURN
  568. returntype = DROP
  569. bantime = 3600
  570. maxretry = 1
  571. findtime = 1
  572. [murmur]
  573. # AKA mumble-server
  574. port = 64738
  575. action = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol=tcp, chain="%(chain)s", actname=%(banaction)s-tcp]
  576. %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol=udp, chain="%(chain)s", actname=%(banaction)s-udp]
  577. logpath = /var/log/mumble-server/mumble-server.log
  578. [screensharingd]
  579. # For Mac OS Screen Sharing Service (VNC)
  580. logpath = /var/log/system.log
  581. logencoding = utf-8
  582. [haproxy-http-auth]
  583. # HAProxy by default doesn't log to file you'll need to set it up to forward
  584. # logs to a syslog server which would then write them to disk.
  585. # See "haproxy-http-auth" filter for a brief cautionary note when setting
  586. # maxretry and findtime.
  587. logpath = /var/log/haproxy.log
  588. [slapd]
  589. port = ldap,ldaps
  590. filter = slapd
  591. logpath = /var/log/slapd.log