linux:apps:fail2ban
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| linux:apps:fail2ban [2023/09/07 18:08] – [MAIL] oscar | linux:apps:fail2ban [2024/12/28 08:18] (current) – [/etc/fail2ban/filter.d/nginx-x00.conf] oscar | ||
|---|---|---|---|
| Line 505: | Line 505: | ||
| [Definition] | [Definition] | ||
| - | failregex = ^{" | + | # Blocking repeated 404|444|403|400 |
| + | # This will also match requests that are entirely empty | ||
| + | failregex = ^< | ||
| - | ignoreregex | + | datepattern |
| + | ^[^\[]*\[({DATE}) | ||
| + | {^LN-BEG} | ||
| + | |||
| + | journalmatch = _SYSTEMD_UNIT=nginx.service + _COMM=nginx | ||
| </ | </ | ||
| Line 554: | Line 560: | ||
| ===== MAIL ===== | ===== MAIL ===== | ||
| + | ==== / | ||
| + | Fail2ban depends on the log files of postfix, dovecot and rspamd. It should only be started after these services. To achieve this add these services into: | ||
| + | < | ||
| + | # nano / | ||
| + | ------------------------------------------- | ||
| + | [Unit] | ||
| + | ... | ||
| + | After=network.target iptables.service firewalld.service ip6tables.service ipset.service nftables.service dovecot.service postfix.service rspamd.service | ||
| + | </ | ||
| + | |||
| + | ==== Config ==== | ||
| We enables the following 3 default Debian fail2ban installation jails for our mail server: | We enables the following 3 default Debian fail2ban installation jails for our mail server: | ||
| * **dovecot.conf**: | * **dovecot.conf**: | ||
linux/apps/fail2ban.1694110111.txt.gz · Last modified: by oscar
