Changes

Block SMTP Authentication Attacks With Fail2Ban

118 bytes added, 03:08, 8 February 2014
/* configure */
The following lines were added (+) and removed (-):
#configuration files: /etc/fail2ban#configuration files: ./fail2ban#regex filters: /etc/fail2ban/filter.d#regex filters: ./fail2ban/filter.d#action file (do/block): /etc/fail2ban/action.d#action file (do/block): ./fail2ban/action.d   vi /etc/fail2ban/filter.d   vi ./fail2ban/[[sample-filter.d|filter.d]]Next edit the action.d  Next edit the postfix-sasl.conf and iptables-multiport-tcp.conf action files.  vi ./fail2ban/filter.d/[[sample-postfix-sasl.conf|postfix-sasl.conf]]  vi ./fail2ban/action.d/[[sample-iptables-multiport-tcp.conf|iptables-multiport-tcp.conf]] Do not directly edit jail.conf. Comments in jail.conf clearly warn against modifications in jail.conf.  Put your customizations in a jail.local file or a jail.d/customisation.local  ===== jail.conf / jail.local =====   cp ./fail2ban/jail.conf ./fail2ban/jail.local    vi ./fail2ban/[[sample-jail.local|jail.local]]Comments in jail.conf clearly warn against modifications in jail.conf.  Put your customizations in a jail.local file or a jail.d/customisation.local     cp /etc/fail2ban/jail.conf /etc/fail2ban/jail.local   vi /etc/fail2ban/jail.local*filter: Refers to the appropriate filter file in "/etc/fail2ban/filter.d".*filter: Refers to the appropriate filter file in "./fail2ban/filter.d".The configure section is incomplete!  We need a tested and proven configuration to post here.{{:Sparse Entry}}
Bureaucrat, administrator
14,711
edits