Sophie

Sophie

sources > fail2ban > fail2ban-0.8.10-jail-conf.patch
fail2ban-0.8.10-jail-conf.patch Mageia 4 x86_64 ; Mageia 4 i586
Index: jail.conf
===================================================================
--- config/jail.conf
+++ config/jail.conf	2013-06-19 06:32:02.660734060 +0200
@@ -66,8 +66,8 @@
 filter   = sshd
 action   = iptables[name=SSH, port=ssh, protocol=tcp]
            sendmail-whois[name=SSH, dest=you@example.com, sender=fail2ban@example.com]
-logpath  = /var/log/sshd.log
-maxretry = 5
+logpath  = /var/log/auth.log
+maxretry = 3
 
 [proftpd-iptables]
 
@@ -106,7 +106,7 @@
 action      = hostsdeny
               sendmail-whois[name=SSH, dest=you@example.com]
 ignoreregex = for myuser from
-logpath     = /var/log/sshd.log
+logpath     = /var/log/auth.log
 
 # Here we use blackhole routes for not requiring any additional kernel support
 # to store large volumes of banned IPs
@@ -116,8 +116,8 @@
 enabled = false
 filter = sshd
 action = route
-logpath = /var/log/sshd.log
-maxretry = 5
+logpath = /var/log/auth.log
+maxretry = 3
 
 # Here we use a combination of Netfilter/Iptables and IPsets
 # for storing large volumes of banned IPs
@@ -129,15 +129,15 @@
 enabled  = false
 filter   = sshd
 action   = iptables-ipset-proto4[name=SSH, port=ssh, protocol=tcp]
-logpath  = /var/log/sshd.log
-maxretry = 5
+logpath  = /var/log/auth.log
+maxretry = 3
 
 [ssh-iptables-ipset6]
 enabled  = false
 filter   = sshd
 action   = iptables-ipset-proto6[name=SSH, port=ssh, protocol=tcp, bantime=600]
-logpath  = /var/log/sshd.log
-maxretry = 5
+logpath  = /var/log/auth.log
+maxretry = 3
 
 # bsd-ipfw is ipfw used by BSD. It uses ipfw tables.
 # table number must be unique.
@@ -398,7 +398,7 @@
 enabled=false
 filter = sshd
 action = pf
-logpath  = /var/log/sshd.log
-maxretry=5
+logpath  = /var/log/auth.log
+maxretry=3