Index: jail.conf
===================================================================
--- config/jail.conf
+++ config/jail.conf 2013-06-19 06:32:02.660734060 +0200
@@ -66,8 +66,8 @@
filter = sshd
action = iptables[name=SSH, port=ssh, protocol=tcp]
sendmail-whois[name=SSH, dest=you@example.com, sender=fail2ban@example.com]
-logpath = /var/log/sshd.log
-maxretry = 5
+logpath = /var/log/auth.log
+maxretry = 3
[proftpd-iptables]
@@ -106,7 +106,7 @@
action = hostsdeny
sendmail-whois[name=SSH, dest=you@example.com]
ignoreregex = for myuser from
-logpath = /var/log/sshd.log
+logpath = /var/log/auth.log
# Here we use blackhole routes for not requiring any additional kernel support
# to store large volumes of banned IPs
@@ -116,8 +116,8 @@
enabled = false
filter = sshd
action = route
-logpath = /var/log/sshd.log
-maxretry = 5
+logpath = /var/log/auth.log
+maxretry = 3
# Here we use a combination of Netfilter/Iptables and IPsets
# for storing large volumes of banned IPs
@@ -129,15 +129,15 @@
enabled = false
filter = sshd
action = iptables-ipset-proto4[name=SSH, port=ssh, protocol=tcp]
-logpath = /var/log/sshd.log
-maxretry = 5
+logpath = /var/log/auth.log
+maxretry = 3
[ssh-iptables-ipset6]
enabled = false
filter = sshd
action = iptables-ipset-proto6[name=SSH, port=ssh, protocol=tcp, bantime=600]
-logpath = /var/log/sshd.log
-maxretry = 5
+logpath = /var/log/auth.log
+maxretry = 3
# bsd-ipfw is ipfw used by BSD. It uses ipfw tables.
# table number must be unique.
@@ -398,7 +398,7 @@
enabled=false
filter = sshd
action = pf
-logpath = /var/log/sshd.log
-maxretry=5
+logpath = /var/log/auth.log
+maxretry=3