pkgsrc/security/fail2ban/PLIST

505 lines
24 KiB
Text
Raw Normal View History

Updated to 0.9.3. Some of the upstream changes for 0.9.2 : - various typo in config files - filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to ignore system authentication issues - some fixes for EL7 New features : - New filters: - postfix-rbl - apache-fakegooglebot.conf - nginx-botsearch - drupal-auth - New actions: - action.d/firewallcmd-multiport and action.d/firewallcmd-allports - action.d/sendmail-geoip-lines.conf - action.d/nsupdate to update DNSBL - New status argument for fail2ban-client Some of the upstream changes for 0.9.3 : - IMPORTANT incompatible changes: * filter.d/roundcube-auth.conf - Changed logpath to 'errors' log (was 'userlogins') * action.d/iptables-common.conf - All calls to iptables command now use -w switch introduced in iptables 1.4.20 (some distribution could have patched their earlier base version as well) to provide this locking mechanism useful under heavy load to avoid contesting on iptables calls. If you need to disable, define 'action.d/iptables-common.local' with empty value for 'lockingopt' in `[Init]` section. * mail-whois-lines, sendmail-geoip-lines and sendmail-whois-lines actions now include by default only the first 1000 log lines in the emails. Adjust <grepopts> to augment the behavior. - New Features: * New filters: - froxlor-auth - Thanks Joern Muehlencord - apache-pass - filter Apache access log for successful authentication * New actions: - shorewall-ipset-proto6 - using proto feature of the Shorewall. Still requires manual pre-configuration of the shorewall. See the action file for detail. * New jails: - pass2allow-ftp - allows FTP traffic after successful HTTP authentication
2015-11-27 16:41:47 +01:00
@comment $NetBSD: PLIST,v 1.2 2015/11/27 15:41:47 nils Exp $
bin/fail2ban-client
bin/fail2ban-regex
bin/fail2ban-server
bin/fail2ban-testcases
${PYSITELIB}/${EGG_FILE}/PKG-INFO
${PYSITELIB}/${EGG_FILE}/SOURCES.txt
${PYSITELIB}/${EGG_FILE}/dependency_links.txt
${PYSITELIB}/${EGG_FILE}/top_level.txt
${PYSITELIB}/fail2ban/__init__.py
${PYSITELIB}/fail2ban/__init__.pyc
${PYSITELIB}/fail2ban/__init__.pyo
${PYSITELIB}/fail2ban/client/__init__.py
${PYSITELIB}/fail2ban/client/__init__.pyc
${PYSITELIB}/fail2ban/client/__init__.pyo
${PYSITELIB}/fail2ban/client/actionreader.py
${PYSITELIB}/fail2ban/client/actionreader.pyc
${PYSITELIB}/fail2ban/client/actionreader.pyo
${PYSITELIB}/fail2ban/client/beautifier.py
${PYSITELIB}/fail2ban/client/beautifier.pyc
${PYSITELIB}/fail2ban/client/beautifier.pyo
${PYSITELIB}/fail2ban/client/configparserinc.py
${PYSITELIB}/fail2ban/client/configparserinc.pyc
${PYSITELIB}/fail2ban/client/configparserinc.pyo
${PYSITELIB}/fail2ban/client/configreader.py
${PYSITELIB}/fail2ban/client/configreader.pyc
${PYSITELIB}/fail2ban/client/configreader.pyo
${PYSITELIB}/fail2ban/client/configurator.py
${PYSITELIB}/fail2ban/client/configurator.pyc
${PYSITELIB}/fail2ban/client/configurator.pyo
${PYSITELIB}/fail2ban/client/csocket.py
${PYSITELIB}/fail2ban/client/csocket.pyc
${PYSITELIB}/fail2ban/client/csocket.pyo
${PYSITELIB}/fail2ban/client/fail2banreader.py
${PYSITELIB}/fail2ban/client/fail2banreader.pyc
${PYSITELIB}/fail2ban/client/fail2banreader.pyo
${PYSITELIB}/fail2ban/client/filterreader.py
${PYSITELIB}/fail2ban/client/filterreader.pyc
${PYSITELIB}/fail2ban/client/filterreader.pyo
${PYSITELIB}/fail2ban/client/jailreader.py
${PYSITELIB}/fail2ban/client/jailreader.pyc
${PYSITELIB}/fail2ban/client/jailreader.pyo
${PYSITELIB}/fail2ban/client/jailsreader.py
${PYSITELIB}/fail2ban/client/jailsreader.pyc
${PYSITELIB}/fail2ban/client/jailsreader.pyo
${PYSITELIB}/fail2ban/exceptions.py
${PYSITELIB}/fail2ban/exceptions.pyc
${PYSITELIB}/fail2ban/exceptions.pyo
${PYSITELIB}/fail2ban/helpers.py
${PYSITELIB}/fail2ban/helpers.pyc
${PYSITELIB}/fail2ban/helpers.pyo
${PYSITELIB}/fail2ban/protocol.py
${PYSITELIB}/fail2ban/protocol.pyc
${PYSITELIB}/fail2ban/protocol.pyo
${PYSITELIB}/fail2ban/server/__init__.py
${PYSITELIB}/fail2ban/server/__init__.pyc
${PYSITELIB}/fail2ban/server/__init__.pyo
${PYSITELIB}/fail2ban/server/action.py
${PYSITELIB}/fail2ban/server/action.pyc
${PYSITELIB}/fail2ban/server/action.pyo
${PYSITELIB}/fail2ban/server/actions.py
${PYSITELIB}/fail2ban/server/actions.pyc
${PYSITELIB}/fail2ban/server/actions.pyo
${PYSITELIB}/fail2ban/server/asyncserver.py
${PYSITELIB}/fail2ban/server/asyncserver.pyc
${PYSITELIB}/fail2ban/server/asyncserver.pyo
${PYSITELIB}/fail2ban/server/banmanager.py
${PYSITELIB}/fail2ban/server/banmanager.pyc
${PYSITELIB}/fail2ban/server/banmanager.pyo
${PYSITELIB}/fail2ban/server/database.py
${PYSITELIB}/fail2ban/server/database.pyc
${PYSITELIB}/fail2ban/server/database.pyo
${PYSITELIB}/fail2ban/server/datedetector.py
${PYSITELIB}/fail2ban/server/datedetector.pyc
${PYSITELIB}/fail2ban/server/datedetector.pyo
${PYSITELIB}/fail2ban/server/datetemplate.py
${PYSITELIB}/fail2ban/server/datetemplate.pyc
${PYSITELIB}/fail2ban/server/datetemplate.pyo
${PYSITELIB}/fail2ban/server/faildata.py
${PYSITELIB}/fail2ban/server/faildata.pyc
${PYSITELIB}/fail2ban/server/faildata.pyo
${PYSITELIB}/fail2ban/server/failmanager.py
${PYSITELIB}/fail2ban/server/failmanager.pyc
${PYSITELIB}/fail2ban/server/failmanager.pyo
${PYSITELIB}/fail2ban/server/failregex.py
${PYSITELIB}/fail2ban/server/failregex.pyc
${PYSITELIB}/fail2ban/server/failregex.pyo
${PYSITELIB}/fail2ban/server/filter.py
${PYSITELIB}/fail2ban/server/filter.pyc
${PYSITELIB}/fail2ban/server/filter.pyo
${PYSITELIB}/fail2ban/server/filtergamin.py
${PYSITELIB}/fail2ban/server/filtergamin.pyc
${PYSITELIB}/fail2ban/server/filtergamin.pyo
${PYSITELIB}/fail2ban/server/filterpoll.py
${PYSITELIB}/fail2ban/server/filterpoll.pyc
${PYSITELIB}/fail2ban/server/filterpoll.pyo
${PYSITELIB}/fail2ban/server/filterpyinotify.py
${PYSITELIB}/fail2ban/server/filterpyinotify.pyc
${PYSITELIB}/fail2ban/server/filterpyinotify.pyo
${PYSITELIB}/fail2ban/server/filtersystemd.py
${PYSITELIB}/fail2ban/server/filtersystemd.pyc
${PYSITELIB}/fail2ban/server/filtersystemd.pyo
${PYSITELIB}/fail2ban/server/jail.py
${PYSITELIB}/fail2ban/server/jail.pyc
${PYSITELIB}/fail2ban/server/jail.pyo
${PYSITELIB}/fail2ban/server/jails.py
${PYSITELIB}/fail2ban/server/jails.pyc
${PYSITELIB}/fail2ban/server/jails.pyo
${PYSITELIB}/fail2ban/server/jailthread.py
${PYSITELIB}/fail2ban/server/jailthread.pyc
${PYSITELIB}/fail2ban/server/jailthread.pyo
${PYSITELIB}/fail2ban/server/mytime.py
${PYSITELIB}/fail2ban/server/mytime.pyc
${PYSITELIB}/fail2ban/server/mytime.pyo
${PYSITELIB}/fail2ban/server/server.py
${PYSITELIB}/fail2ban/server/server.pyc
${PYSITELIB}/fail2ban/server/server.pyo
${PYSITELIB}/fail2ban/server/strptime.py
${PYSITELIB}/fail2ban/server/strptime.pyc
${PYSITELIB}/fail2ban/server/strptime.pyo
${PYSITELIB}/fail2ban/server/ticket.py
${PYSITELIB}/fail2ban/server/ticket.pyc
${PYSITELIB}/fail2ban/server/ticket.pyo
${PYSITELIB}/fail2ban/server/transmitter.py
${PYSITELIB}/fail2ban/server/transmitter.pyc
${PYSITELIB}/fail2ban/server/transmitter.pyo
${PYSITELIB}/fail2ban/tests/__init__.py
${PYSITELIB}/fail2ban/tests/__init__.pyc
${PYSITELIB}/fail2ban/tests/__init__.pyo
${PYSITELIB}/fail2ban/tests/action_d/__init__.py
${PYSITELIB}/fail2ban/tests/action_d/__init__.pyc
${PYSITELIB}/fail2ban/tests/action_d/__init__.pyo
${PYSITELIB}/fail2ban/tests/action_d/test_badips.py
${PYSITELIB}/fail2ban/tests/action_d/test_badips.pyc
${PYSITELIB}/fail2ban/tests/action_d/test_badips.pyo
${PYSITELIB}/fail2ban/tests/action_d/test_smtp.py
${PYSITELIB}/fail2ban/tests/action_d/test_smtp.pyc
${PYSITELIB}/fail2ban/tests/action_d/test_smtp.pyo
${PYSITELIB}/fail2ban/tests/actionstestcase.py
${PYSITELIB}/fail2ban/tests/actionstestcase.pyc
${PYSITELIB}/fail2ban/tests/actionstestcase.pyo
${PYSITELIB}/fail2ban/tests/actiontestcase.py
${PYSITELIB}/fail2ban/tests/actiontestcase.pyc
${PYSITELIB}/fail2ban/tests/actiontestcase.pyo
${PYSITELIB}/fail2ban/tests/banmanagertestcase.py
${PYSITELIB}/fail2ban/tests/banmanagertestcase.pyc
${PYSITELIB}/fail2ban/tests/banmanagertestcase.pyo
${PYSITELIB}/fail2ban/tests/clientreadertestcase.py
${PYSITELIB}/fail2ban/tests/clientreadertestcase.pyc
${PYSITELIB}/fail2ban/tests/clientreadertestcase.pyo
${PYSITELIB}/fail2ban/tests/config/action.d/brokenaction.conf
${PYSITELIB}/fail2ban/tests/config/fail2ban.conf
${PYSITELIB}/fail2ban/tests/config/filter.d/simple.conf
Updated to 0.9.3. Some of the upstream changes for 0.9.2 : - various typo in config files - filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to ignore system authentication issues - some fixes for EL7 New features : - New filters: - postfix-rbl - apache-fakegooglebot.conf - nginx-botsearch - drupal-auth - New actions: - action.d/firewallcmd-multiport and action.d/firewallcmd-allports - action.d/sendmail-geoip-lines.conf - action.d/nsupdate to update DNSBL - New status argument for fail2ban-client Some of the upstream changes for 0.9.3 : - IMPORTANT incompatible changes: * filter.d/roundcube-auth.conf - Changed logpath to 'errors' log (was 'userlogins') * action.d/iptables-common.conf - All calls to iptables command now use -w switch introduced in iptables 1.4.20 (some distribution could have patched their earlier base version as well) to provide this locking mechanism useful under heavy load to avoid contesting on iptables calls. If you need to disable, define 'action.d/iptables-common.local' with empty value for 'lockingopt' in `[Init]` section. * mail-whois-lines, sendmail-geoip-lines and sendmail-whois-lines actions now include by default only the first 1000 log lines in the emails. Adjust <grepopts> to augment the behavior. - New Features: * New filters: - froxlor-auth - Thanks Joern Muehlencord - apache-pass - filter Apache access log for successful authentication * New actions: - shorewall-ipset-proto6 - using proto feature of the Shorewall. Still requires manual pre-configuration of the shorewall. See the action file for detail. * New jails: - pass2allow-ftp - allows FTP traffic after successful HTTP authentication
2015-11-27 16:41:47 +01:00
${PYSITELIB}/fail2ban/tests/config/filter.d/test.conf
${PYSITELIB}/fail2ban/tests/config/filter.d/test.local
${PYSITELIB}/fail2ban/tests/config/jail.conf
${PYSITELIB}/fail2ban/tests/databasetestcase.py
${PYSITELIB}/fail2ban/tests/databasetestcase.pyc
${PYSITELIB}/fail2ban/tests/databasetestcase.pyo
${PYSITELIB}/fail2ban/tests/datedetectortestcase.py
${PYSITELIB}/fail2ban/tests/datedetectortestcase.pyc
${PYSITELIB}/fail2ban/tests/datedetectortestcase.pyo
${PYSITELIB}/fail2ban/tests/dummyjail.py
${PYSITELIB}/fail2ban/tests/dummyjail.pyc
${PYSITELIB}/fail2ban/tests/dummyjail.pyo
${PYSITELIB}/fail2ban/tests/failmanagertestcase.py
${PYSITELIB}/fail2ban/tests/failmanagertestcase.pyc
${PYSITELIB}/fail2ban/tests/failmanagertestcase.pyo
${PYSITELIB}/fail2ban/tests/files/action.d/action.py
${PYSITELIB}/fail2ban/tests/files/action.d/action.pyc
${PYSITELIB}/fail2ban/tests/files/action.d/action.pyo
Updated to 0.9.3. Some of the upstream changes for 0.9.2 : - various typo in config files - filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to ignore system authentication issues - some fixes for EL7 New features : - New filters: - postfix-rbl - apache-fakegooglebot.conf - nginx-botsearch - drupal-auth - New actions: - action.d/firewallcmd-multiport and action.d/firewallcmd-allports - action.d/sendmail-geoip-lines.conf - action.d/nsupdate to update DNSBL - New status argument for fail2ban-client Some of the upstream changes for 0.9.3 : - IMPORTANT incompatible changes: * filter.d/roundcube-auth.conf - Changed logpath to 'errors' log (was 'userlogins') * action.d/iptables-common.conf - All calls to iptables command now use -w switch introduced in iptables 1.4.20 (some distribution could have patched their earlier base version as well) to provide this locking mechanism useful under heavy load to avoid contesting on iptables calls. If you need to disable, define 'action.d/iptables-common.local' with empty value for 'lockingopt' in `[Init]` section. * mail-whois-lines, sendmail-geoip-lines and sendmail-whois-lines actions now include by default only the first 1000 log lines in the emails. Adjust <grepopts> to augment the behavior. - New Features: * New filters: - froxlor-auth - Thanks Joern Muehlencord - apache-pass - filter Apache access log for successful authentication * New actions: - shorewall-ipset-proto6 - using proto feature of the Shorewall. Still requires manual pre-configuration of the shorewall. See the action file for detail. * New jails: - pass2allow-ftp - allows FTP traffic after successful HTTP authentication
2015-11-27 16:41:47 +01:00
${PYSITELIB}/fail2ban/tests/files/action.d/action_checkainfo.py
${PYSITELIB}/fail2ban/tests/files/action.d/action_checkainfo.pyc
${PYSITELIB}/fail2ban/tests/files/action.d/action_checkainfo.pyo
${PYSITELIB}/fail2ban/tests/files/action.d/action_errors.py
${PYSITELIB}/fail2ban/tests/files/action.d/action_errors.pyc
${PYSITELIB}/fail2ban/tests/files/action.d/action_errors.pyo
${PYSITELIB}/fail2ban/tests/files/action.d/action_modifyainfo.py
${PYSITELIB}/fail2ban/tests/files/action.d/action_modifyainfo.pyc
${PYSITELIB}/fail2ban/tests/files/action.d/action_modifyainfo.pyo
${PYSITELIB}/fail2ban/tests/files/action.d/action_noAction.py
${PYSITELIB}/fail2ban/tests/files/action.d/action_noAction.pyc
${PYSITELIB}/fail2ban/tests/files/action.d/action_noAction.pyo
${PYSITELIB}/fail2ban/tests/files/action.d/action_nomethod.py
${PYSITELIB}/fail2ban/tests/files/action.d/action_nomethod.pyc
${PYSITELIB}/fail2ban/tests/files/action.d/action_nomethod.pyo
${PYSITELIB}/fail2ban/tests/files/config/apache-auth/README
${PYSITELIB}/fail2ban/tests/files/config/apache-auth/basic/authz_owner/.htaccess
${PYSITELIB}/fail2ban/tests/files/config/apache-auth/basic/authz_owner/.htpasswd
${PYSITELIB}/fail2ban/tests/files/config/apache-auth/basic/authz_owner/cant_get_me.html
${PYSITELIB}/fail2ban/tests/files/config/apache-auth/basic/file/.htaccess
${PYSITELIB}/fail2ban/tests/files/config/apache-auth/basic/file/.htpasswd
${PYSITELIB}/fail2ban/tests/files/config/apache-auth/digest.py
${PYSITELIB}/fail2ban/tests/files/config/apache-auth/digest.pyc
${PYSITELIB}/fail2ban/tests/files/config/apache-auth/digest.pyo
${PYSITELIB}/fail2ban/tests/files/config/apache-auth/digest/.htaccess
${PYSITELIB}/fail2ban/tests/files/config/apache-auth/digest/.htpasswd
${PYSITELIB}/fail2ban/tests/files/config/apache-auth/digest_anon/.htaccess
${PYSITELIB}/fail2ban/tests/files/config/apache-auth/digest_anon/.htpasswd
${PYSITELIB}/fail2ban/tests/files/config/apache-auth/digest_time/.htaccess
${PYSITELIB}/fail2ban/tests/files/config/apache-auth/digest_time/.htpasswd
${PYSITELIB}/fail2ban/tests/files/config/apache-auth/digest_wrongrelm/.htaccess
${PYSITELIB}/fail2ban/tests/files/config/apache-auth/digest_wrongrelm/.htpasswd
${PYSITELIB}/fail2ban/tests/files/config/apache-auth/noentry/.htaccess
${PYSITELIB}/fail2ban/tests/files/database_v1.db
${PYSITELIB}/fail2ban/tests/files/filter.d/substition.conf
${PYSITELIB}/fail2ban/tests/files/filter.d/testcase-common.conf
${PYSITELIB}/fail2ban/tests/files/filter.d/testcase01.conf
${PYSITELIB}/fail2ban/tests/files/ignorecommand.py
${PYSITELIB}/fail2ban/tests/files/ignorecommand.pyc
${PYSITELIB}/fail2ban/tests/files/ignorecommand.pyo
${PYSITELIB}/fail2ban/tests/files/logs/3proxy
${PYSITELIB}/fail2ban/tests/files/logs/apache-auth
${PYSITELIB}/fail2ban/tests/files/logs/apache-badbots
${PYSITELIB}/fail2ban/tests/files/logs/apache-botsearch
Updated to 0.9.3. Some of the upstream changes for 0.9.2 : - various typo in config files - filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to ignore system authentication issues - some fixes for EL7 New features : - New filters: - postfix-rbl - apache-fakegooglebot.conf - nginx-botsearch - drupal-auth - New actions: - action.d/firewallcmd-multiport and action.d/firewallcmd-allports - action.d/sendmail-geoip-lines.conf - action.d/nsupdate to update DNSBL - New status argument for fail2ban-client Some of the upstream changes for 0.9.3 : - IMPORTANT incompatible changes: * filter.d/roundcube-auth.conf - Changed logpath to 'errors' log (was 'userlogins') * action.d/iptables-common.conf - All calls to iptables command now use -w switch introduced in iptables 1.4.20 (some distribution could have patched their earlier base version as well) to provide this locking mechanism useful under heavy load to avoid contesting on iptables calls. If you need to disable, define 'action.d/iptables-common.local' with empty value for 'lockingopt' in `[Init]` section. * mail-whois-lines, sendmail-geoip-lines and sendmail-whois-lines actions now include by default only the first 1000 log lines in the emails. Adjust <grepopts> to augment the behavior. - New Features: * New filters: - froxlor-auth - Thanks Joern Muehlencord - apache-pass - filter Apache access log for successful authentication * New actions: - shorewall-ipset-proto6 - using proto feature of the Shorewall. Still requires manual pre-configuration of the shorewall. See the action file for detail. * New jails: - pass2allow-ftp - allows FTP traffic after successful HTTP authentication
2015-11-27 16:41:47 +01:00
${PYSITELIB}/fail2ban/tests/files/logs/apache-fakegooglebot
${PYSITELIB}/fail2ban/tests/files/logs/apache-modsecurity
${PYSITELIB}/fail2ban/tests/files/logs/apache-nohome
${PYSITELIB}/fail2ban/tests/files/logs/apache-noscript
${PYSITELIB}/fail2ban/tests/files/logs/apache-overflows
Updated to 0.9.3. Some of the upstream changes for 0.9.2 : - various typo in config files - filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to ignore system authentication issues - some fixes for EL7 New features : - New filters: - postfix-rbl - apache-fakegooglebot.conf - nginx-botsearch - drupal-auth - New actions: - action.d/firewallcmd-multiport and action.d/firewallcmd-allports - action.d/sendmail-geoip-lines.conf - action.d/nsupdate to update DNSBL - New status argument for fail2ban-client Some of the upstream changes for 0.9.3 : - IMPORTANT incompatible changes: * filter.d/roundcube-auth.conf - Changed logpath to 'errors' log (was 'userlogins') * action.d/iptables-common.conf - All calls to iptables command now use -w switch introduced in iptables 1.4.20 (some distribution could have patched their earlier base version as well) to provide this locking mechanism useful under heavy load to avoid contesting on iptables calls. If you need to disable, define 'action.d/iptables-common.local' with empty value for 'lockingopt' in `[Init]` section. * mail-whois-lines, sendmail-geoip-lines and sendmail-whois-lines actions now include by default only the first 1000 log lines in the emails. Adjust <grepopts> to augment the behavior. - New Features: * New filters: - froxlor-auth - Thanks Joern Muehlencord - apache-pass - filter Apache access log for successful authentication * New actions: - shorewall-ipset-proto6 - using proto feature of the Shorewall. Still requires manual pre-configuration of the shorewall. See the action file for detail. * New jails: - pass2allow-ftp - allows FTP traffic after successful HTTP authentication
2015-11-27 16:41:47 +01:00
${PYSITELIB}/fail2ban/tests/files/logs/apache-pass
${PYSITELIB}/fail2ban/tests/files/logs/apache-shellshock
${PYSITELIB}/fail2ban/tests/files/logs/assp
${PYSITELIB}/fail2ban/tests/files/logs/asterisk
${PYSITELIB}/fail2ban/tests/files/logs/bsd/syslog-plain.txt
${PYSITELIB}/fail2ban/tests/files/logs/bsd/syslog-v.txt
${PYSITELIB}/fail2ban/tests/files/logs/bsd/syslog-vv.txt
${PYSITELIB}/fail2ban/tests/files/logs/counter-strike
${PYSITELIB}/fail2ban/tests/files/logs/courier-auth
${PYSITELIB}/fail2ban/tests/files/logs/courier-smtp
${PYSITELIB}/fail2ban/tests/files/logs/cyrus-imap
${PYSITELIB}/fail2ban/tests/files/logs/directadmin
${PYSITELIB}/fail2ban/tests/files/logs/dovecot
${PYSITELIB}/fail2ban/tests/files/logs/dropbear
Updated to 0.9.3. Some of the upstream changes for 0.9.2 : - various typo in config files - filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to ignore system authentication issues - some fixes for EL7 New features : - New filters: - postfix-rbl - apache-fakegooglebot.conf - nginx-botsearch - drupal-auth - New actions: - action.d/firewallcmd-multiport and action.d/firewallcmd-allports - action.d/sendmail-geoip-lines.conf - action.d/nsupdate to update DNSBL - New status argument for fail2ban-client Some of the upstream changes for 0.9.3 : - IMPORTANT incompatible changes: * filter.d/roundcube-auth.conf - Changed logpath to 'errors' log (was 'userlogins') * action.d/iptables-common.conf - All calls to iptables command now use -w switch introduced in iptables 1.4.20 (some distribution could have patched their earlier base version as well) to provide this locking mechanism useful under heavy load to avoid contesting on iptables calls. If you need to disable, define 'action.d/iptables-common.local' with empty value for 'lockingopt' in `[Init]` section. * mail-whois-lines, sendmail-geoip-lines and sendmail-whois-lines actions now include by default only the first 1000 log lines in the emails. Adjust <grepopts> to augment the behavior. - New Features: * New filters: - froxlor-auth - Thanks Joern Muehlencord - apache-pass - filter Apache access log for successful authentication * New actions: - shorewall-ipset-proto6 - using proto feature of the Shorewall. Still requires manual pre-configuration of the shorewall. See the action file for detail. * New jails: - pass2allow-ftp - allows FTP traffic after successful HTTP authentication
2015-11-27 16:41:47 +01:00
${PYSITELIB}/fail2ban/tests/files/logs/drupal-auth
${PYSITELIB}/fail2ban/tests/files/logs/ejabberd-auth
${PYSITELIB}/fail2ban/tests/files/logs/exim
${PYSITELIB}/fail2ban/tests/files/logs/exim-spam
${PYSITELIB}/fail2ban/tests/files/logs/freeswitch
Updated to 0.9.3. Some of the upstream changes for 0.9.2 : - various typo in config files - filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to ignore system authentication issues - some fixes for EL7 New features : - New filters: - postfix-rbl - apache-fakegooglebot.conf - nginx-botsearch - drupal-auth - New actions: - action.d/firewallcmd-multiport and action.d/firewallcmd-allports - action.d/sendmail-geoip-lines.conf - action.d/nsupdate to update DNSBL - New status argument for fail2ban-client Some of the upstream changes for 0.9.3 : - IMPORTANT incompatible changes: * filter.d/roundcube-auth.conf - Changed logpath to 'errors' log (was 'userlogins') * action.d/iptables-common.conf - All calls to iptables command now use -w switch introduced in iptables 1.4.20 (some distribution could have patched their earlier base version as well) to provide this locking mechanism useful under heavy load to avoid contesting on iptables calls. If you need to disable, define 'action.d/iptables-common.local' with empty value for 'lockingopt' in `[Init]` section. * mail-whois-lines, sendmail-geoip-lines and sendmail-whois-lines actions now include by default only the first 1000 log lines in the emails. Adjust <grepopts> to augment the behavior. - New Features: * New filters: - froxlor-auth - Thanks Joern Muehlencord - apache-pass - filter Apache access log for successful authentication * New actions: - shorewall-ipset-proto6 - using proto feature of the Shorewall. Still requires manual pre-configuration of the shorewall. See the action file for detail. * New jails: - pass2allow-ftp - allows FTP traffic after successful HTTP authentication
2015-11-27 16:41:47 +01:00
${PYSITELIB}/fail2ban/tests/files/logs/froxlor-auth
${PYSITELIB}/fail2ban/tests/files/logs/groupoffice
${PYSITELIB}/fail2ban/tests/files/logs/gssftpd
${PYSITELIB}/fail2ban/tests/files/logs/guacamole
${PYSITELIB}/fail2ban/tests/files/logs/horde
${PYSITELIB}/fail2ban/tests/files/logs/kerio
${PYSITELIB}/fail2ban/tests/files/logs/lighttpd-auth
${PYSITELIB}/fail2ban/tests/files/logs/monit
${PYSITELIB}/fail2ban/tests/files/logs/mysqld-auth
${PYSITELIB}/fail2ban/tests/files/logs/nagios
${PYSITELIB}/fail2ban/tests/files/logs/named-refused
Updated to 0.9.3. Some of the upstream changes for 0.9.2 : - various typo in config files - filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to ignore system authentication issues - some fixes for EL7 New features : - New filters: - postfix-rbl - apache-fakegooglebot.conf - nginx-botsearch - drupal-auth - New actions: - action.d/firewallcmd-multiport and action.d/firewallcmd-allports - action.d/sendmail-geoip-lines.conf - action.d/nsupdate to update DNSBL - New status argument for fail2ban-client Some of the upstream changes for 0.9.3 : - IMPORTANT incompatible changes: * filter.d/roundcube-auth.conf - Changed logpath to 'errors' log (was 'userlogins') * action.d/iptables-common.conf - All calls to iptables command now use -w switch introduced in iptables 1.4.20 (some distribution could have patched their earlier base version as well) to provide this locking mechanism useful under heavy load to avoid contesting on iptables calls. If you need to disable, define 'action.d/iptables-common.local' with empty value for 'lockingopt' in `[Init]` section. * mail-whois-lines, sendmail-geoip-lines and sendmail-whois-lines actions now include by default only the first 1000 log lines in the emails. Adjust <grepopts> to augment the behavior. - New Features: * New filters: - froxlor-auth - Thanks Joern Muehlencord - apache-pass - filter Apache access log for successful authentication * New actions: - shorewall-ipset-proto6 - using proto feature of the Shorewall. Still requires manual pre-configuration of the shorewall. See the action file for detail. * New jails: - pass2allow-ftp - allows FTP traffic after successful HTTP authentication
2015-11-27 16:41:47 +01:00
${PYSITELIB}/fail2ban/tests/files/logs/nginx-botsearch
${PYSITELIB}/fail2ban/tests/files/logs/nginx-http-auth
${PYSITELIB}/fail2ban/tests/files/logs/nsd
${PYSITELIB}/fail2ban/tests/files/logs/openwebmail
${PYSITELIB}/fail2ban/tests/files/logs/oracleims
${PYSITELIB}/fail2ban/tests/files/logs/pam-generic
${PYSITELIB}/fail2ban/tests/files/logs/perdition
${PYSITELIB}/fail2ban/tests/files/logs/php-url-fopen
${PYSITELIB}/fail2ban/tests/files/logs/portsentry
${PYSITELIB}/fail2ban/tests/files/logs/postfix
Updated to 0.9.3. Some of the upstream changes for 0.9.2 : - various typo in config files - filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to ignore system authentication issues - some fixes for EL7 New features : - New filters: - postfix-rbl - apache-fakegooglebot.conf - nginx-botsearch - drupal-auth - New actions: - action.d/firewallcmd-multiport and action.d/firewallcmd-allports - action.d/sendmail-geoip-lines.conf - action.d/nsupdate to update DNSBL - New status argument for fail2ban-client Some of the upstream changes for 0.9.3 : - IMPORTANT incompatible changes: * filter.d/roundcube-auth.conf - Changed logpath to 'errors' log (was 'userlogins') * action.d/iptables-common.conf - All calls to iptables command now use -w switch introduced in iptables 1.4.20 (some distribution could have patched their earlier base version as well) to provide this locking mechanism useful under heavy load to avoid contesting on iptables calls. If you need to disable, define 'action.d/iptables-common.local' with empty value for 'lockingopt' in `[Init]` section. * mail-whois-lines, sendmail-geoip-lines and sendmail-whois-lines actions now include by default only the first 1000 log lines in the emails. Adjust <grepopts> to augment the behavior. - New Features: * New filters: - froxlor-auth - Thanks Joern Muehlencord - apache-pass - filter Apache access log for successful authentication * New actions: - shorewall-ipset-proto6 - using proto feature of the Shorewall. Still requires manual pre-configuration of the shorewall. See the action file for detail. * New jails: - pass2allow-ftp - allows FTP traffic after successful HTTP authentication
2015-11-27 16:41:47 +01:00
${PYSITELIB}/fail2ban/tests/files/logs/postfix-rbl
${PYSITELIB}/fail2ban/tests/files/logs/postfix-sasl
${PYSITELIB}/fail2ban/tests/files/logs/proftpd
${PYSITELIB}/fail2ban/tests/files/logs/pure-ftpd
${PYSITELIB}/fail2ban/tests/files/logs/qmail
${PYSITELIB}/fail2ban/tests/files/logs/recidive
${PYSITELIB}/fail2ban/tests/files/logs/roundcube-auth
${PYSITELIB}/fail2ban/tests/files/logs/selinux-ssh
${PYSITELIB}/fail2ban/tests/files/logs/sendmail-auth
${PYSITELIB}/fail2ban/tests/files/logs/sendmail-reject
${PYSITELIB}/fail2ban/tests/files/logs/sieve
${PYSITELIB}/fail2ban/tests/files/logs/sogo-auth
${PYSITELIB}/fail2ban/tests/files/logs/solid-pop3d
${PYSITELIB}/fail2ban/tests/files/logs/squid
${PYSITELIB}/fail2ban/tests/files/logs/squirrelmail
${PYSITELIB}/fail2ban/tests/files/logs/sshd
${PYSITELIB}/fail2ban/tests/files/logs/sshd-ddos
${PYSITELIB}/fail2ban/tests/files/logs/stunnel
${PYSITELIB}/fail2ban/tests/files/logs/suhosin
${PYSITELIB}/fail2ban/tests/files/logs/tine20
${PYSITELIB}/fail2ban/tests/files/logs/uwimap-auth
${PYSITELIB}/fail2ban/tests/files/logs/vsftpd
${PYSITELIB}/fail2ban/tests/files/logs/webmin-auth
${PYSITELIB}/fail2ban/tests/files/logs/wuftpd
${PYSITELIB}/fail2ban/tests/files/logs/xinetd-fail
${PYSITELIB}/fail2ban/tests/files/testcase-journal.log
${PYSITELIB}/fail2ban/tests/files/testcase-multiline.log
${PYSITELIB}/fail2ban/tests/files/testcase-usedns.log
${PYSITELIB}/fail2ban/tests/files/testcase01.log
${PYSITELIB}/fail2ban/tests/files/testcase02.log
${PYSITELIB}/fail2ban/tests/files/testcase03.log
${PYSITELIB}/fail2ban/tests/files/testcase04.log
${PYSITELIB}/fail2ban/tests/filtertestcase.py
${PYSITELIB}/fail2ban/tests/filtertestcase.pyc
${PYSITELIB}/fail2ban/tests/filtertestcase.pyo
${PYSITELIB}/fail2ban/tests/misctestcase.py
${PYSITELIB}/fail2ban/tests/misctestcase.pyc
${PYSITELIB}/fail2ban/tests/misctestcase.pyo
${PYSITELIB}/fail2ban/tests/samplestestcase.py
${PYSITELIB}/fail2ban/tests/samplestestcase.pyc
${PYSITELIB}/fail2ban/tests/samplestestcase.pyo
${PYSITELIB}/fail2ban/tests/servertestcase.py
${PYSITELIB}/fail2ban/tests/servertestcase.pyc
${PYSITELIB}/fail2ban/tests/servertestcase.pyo
${PYSITELIB}/fail2ban/tests/sockettestcase.py
${PYSITELIB}/fail2ban/tests/sockettestcase.pyc
${PYSITELIB}/fail2ban/tests/sockettestcase.pyo
${PYSITELIB}/fail2ban/tests/utils.py
${PYSITELIB}/fail2ban/tests/utils.pyc
${PYSITELIB}/fail2ban/tests/utils.pyo
${PYSITELIB}/fail2ban/version.py
${PYSITELIB}/fail2ban/version.pyc
${PYSITELIB}/fail2ban/version.pyo
man/man1/fail2ban-client.1
man/man1/fail2ban-regex.1
man/man1/fail2ban-server.1
man/man5/jail.conf.5
share/doc/fail2ban/DEVELOP
share/doc/fail2ban/FILTERS
share/doc/fail2ban/README.Solaris
share/doc/fail2ban/README.md
share/doc/fail2ban/develop.txt
share/doc/fail2ban/fail2ban.client.actionreader.txt
share/doc/fail2ban/fail2ban.client.beautifier.txt
share/doc/fail2ban/fail2ban.client.configparserinc.txt
share/doc/fail2ban/fail2ban.client.configreader.txt
share/doc/fail2ban/fail2ban.client.configurator.txt
share/doc/fail2ban/fail2ban.client.csocket.txt
share/doc/fail2ban/fail2ban.client.fail2banreader.txt
share/doc/fail2ban/fail2ban.client.filterreader.txt
share/doc/fail2ban/fail2ban.client.jailreader.txt
share/doc/fail2ban/fail2ban.client.jailsreader.txt
share/doc/fail2ban/fail2ban.client.txt
share/doc/fail2ban/fail2ban.exceptions.txt
share/doc/fail2ban/fail2ban.helpers.txt
share/doc/fail2ban/fail2ban.protocol.txt
share/doc/fail2ban/fail2ban.server.action.txt
share/doc/fail2ban/fail2ban.server.actions.txt
share/doc/fail2ban/fail2ban.server.asyncserver.txt
share/doc/fail2ban/fail2ban.server.banmanager.txt
share/doc/fail2ban/fail2ban.server.database.txt
share/doc/fail2ban/fail2ban.server.datedetector.txt
share/doc/fail2ban/fail2ban.server.datetemplate.txt
share/doc/fail2ban/fail2ban.server.faildata.txt
share/doc/fail2ban/fail2ban.server.failmanager.txt
share/doc/fail2ban/fail2ban.server.failregex.txt
share/doc/fail2ban/fail2ban.server.filter.txt
share/doc/fail2ban/fail2ban.server.filtergamin.txt
share/doc/fail2ban/fail2ban.server.filterpoll.txt
share/doc/fail2ban/fail2ban.server.filterpyinotify.txt
share/doc/fail2ban/fail2ban.server.filtersystemd.txt
share/doc/fail2ban/fail2ban.server.jail.txt
share/doc/fail2ban/fail2ban.server.jails.txt
share/doc/fail2ban/fail2ban.server.jailthread.txt
share/doc/fail2ban/fail2ban.server.mytime.txt
share/doc/fail2ban/fail2ban.server.server.txt
share/doc/fail2ban/fail2ban.server.strptime.txt
share/doc/fail2ban/fail2ban.server.ticket.txt
share/doc/fail2ban/fail2ban.server.transmitter.txt
share/doc/fail2ban/fail2ban.server.txt
share/doc/fail2ban/fail2ban.txt
share/doc/fail2ban/fail2ban.version.txt
share/doc/fail2ban/filters.txt
share/doc/fail2ban/index.txt
share/doc/fail2ban/release.txt
share/doc/fail2ban/run-rootless.txt
share/examples/fail2ban/action.d/apf.conf
share/examples/fail2ban/action.d/badips.conf
share/examples/fail2ban/action.d/badips.py
share/examples/fail2ban/action.d/blocklist_de.conf
share/examples/fail2ban/action.d/bsd-ipfw.conf
share/examples/fail2ban/action.d/cloudflare.conf
share/examples/fail2ban/action.d/complain.conf
share/examples/fail2ban/action.d/dshield.conf
share/examples/fail2ban/action.d/dummy.conf
Updated to 0.9.3. Some of the upstream changes for 0.9.2 : - various typo in config files - filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to ignore system authentication issues - some fixes for EL7 New features : - New filters: - postfix-rbl - apache-fakegooglebot.conf - nginx-botsearch - drupal-auth - New actions: - action.d/firewallcmd-multiport and action.d/firewallcmd-allports - action.d/sendmail-geoip-lines.conf - action.d/nsupdate to update DNSBL - New status argument for fail2ban-client Some of the upstream changes for 0.9.3 : - IMPORTANT incompatible changes: * filter.d/roundcube-auth.conf - Changed logpath to 'errors' log (was 'userlogins') * action.d/iptables-common.conf - All calls to iptables command now use -w switch introduced in iptables 1.4.20 (some distribution could have patched their earlier base version as well) to provide this locking mechanism useful under heavy load to avoid contesting on iptables calls. If you need to disable, define 'action.d/iptables-common.local' with empty value for 'lockingopt' in `[Init]` section. * mail-whois-lines, sendmail-geoip-lines and sendmail-whois-lines actions now include by default only the first 1000 log lines in the emails. Adjust <grepopts> to augment the behavior. - New Features: * New filters: - froxlor-auth - Thanks Joern Muehlencord - apache-pass - filter Apache access log for successful authentication * New actions: - shorewall-ipset-proto6 - using proto feature of the Shorewall. Still requires manual pre-configuration of the shorewall. See the action file for detail. * New jails: - pass2allow-ftp - allows FTP traffic after successful HTTP authentication
2015-11-27 16:41:47 +01:00
share/examples/fail2ban/action.d/firewallcmd-allports.conf
share/examples/fail2ban/action.d/firewallcmd-ipset.conf
Updated to 0.9.3. Some of the upstream changes for 0.9.2 : - various typo in config files - filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to ignore system authentication issues - some fixes for EL7 New features : - New filters: - postfix-rbl - apache-fakegooglebot.conf - nginx-botsearch - drupal-auth - New actions: - action.d/firewallcmd-multiport and action.d/firewallcmd-allports - action.d/sendmail-geoip-lines.conf - action.d/nsupdate to update DNSBL - New status argument for fail2ban-client Some of the upstream changes for 0.9.3 : - IMPORTANT incompatible changes: * filter.d/roundcube-auth.conf - Changed logpath to 'errors' log (was 'userlogins') * action.d/iptables-common.conf - All calls to iptables command now use -w switch introduced in iptables 1.4.20 (some distribution could have patched their earlier base version as well) to provide this locking mechanism useful under heavy load to avoid contesting on iptables calls. If you need to disable, define 'action.d/iptables-common.local' with empty value for 'lockingopt' in `[Init]` section. * mail-whois-lines, sendmail-geoip-lines and sendmail-whois-lines actions now include by default only the first 1000 log lines in the emails. Adjust <grepopts> to augment the behavior. - New Features: * New filters: - froxlor-auth - Thanks Joern Muehlencord - apache-pass - filter Apache access log for successful authentication * New actions: - shorewall-ipset-proto6 - using proto feature of the Shorewall. Still requires manual pre-configuration of the shorewall. See the action file for detail. * New jails: - pass2allow-ftp - allows FTP traffic after successful HTTP authentication
2015-11-27 16:41:47 +01:00
share/examples/fail2ban/action.d/firewallcmd-multiport.conf
share/examples/fail2ban/action.d/firewallcmd-new.conf
share/examples/fail2ban/action.d/hostsdeny.conf
share/examples/fail2ban/action.d/ipfilter.conf
share/examples/fail2ban/action.d/ipfw.conf
share/examples/fail2ban/action.d/iptables-allports.conf
share/examples/fail2ban/action.d/iptables-common.conf
share/examples/fail2ban/action.d/iptables-ipset-proto4.conf
share/examples/fail2ban/action.d/iptables-ipset-proto6-allports.conf
share/examples/fail2ban/action.d/iptables-ipset-proto6.conf
share/examples/fail2ban/action.d/iptables-multiport-log.conf
share/examples/fail2ban/action.d/iptables-multiport.conf
share/examples/fail2ban/action.d/iptables-new.conf
share/examples/fail2ban/action.d/iptables-xt_recent-echo.conf
share/examples/fail2ban/action.d/iptables.conf
share/examples/fail2ban/action.d/mail-buffered.conf
Updated to 0.9.3. Some of the upstream changes for 0.9.2 : - various typo in config files - filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to ignore system authentication issues - some fixes for EL7 New features : - New filters: - postfix-rbl - apache-fakegooglebot.conf - nginx-botsearch - drupal-auth - New actions: - action.d/firewallcmd-multiport and action.d/firewallcmd-allports - action.d/sendmail-geoip-lines.conf - action.d/nsupdate to update DNSBL - New status argument for fail2ban-client Some of the upstream changes for 0.9.3 : - IMPORTANT incompatible changes: * filter.d/roundcube-auth.conf - Changed logpath to 'errors' log (was 'userlogins') * action.d/iptables-common.conf - All calls to iptables command now use -w switch introduced in iptables 1.4.20 (some distribution could have patched their earlier base version as well) to provide this locking mechanism useful under heavy load to avoid contesting on iptables calls. If you need to disable, define 'action.d/iptables-common.local' with empty value for 'lockingopt' in `[Init]` section. * mail-whois-lines, sendmail-geoip-lines and sendmail-whois-lines actions now include by default only the first 1000 log lines in the emails. Adjust <grepopts> to augment the behavior. - New Features: * New filters: - froxlor-auth - Thanks Joern Muehlencord - apache-pass - filter Apache access log for successful authentication * New actions: - shorewall-ipset-proto6 - using proto feature of the Shorewall. Still requires manual pre-configuration of the shorewall. See the action file for detail. * New jails: - pass2allow-ftp - allows FTP traffic after successful HTTP authentication
2015-11-27 16:41:47 +01:00
share/examples/fail2ban/action.d/mail-whois-common.conf
share/examples/fail2ban/action.d/mail-whois-lines.conf
share/examples/fail2ban/action.d/mail-whois.conf
share/examples/fail2ban/action.d/mail.conf
share/examples/fail2ban/action.d/mynetwatchman.conf
Updated to 0.9.3. Some of the upstream changes for 0.9.2 : - various typo in config files - filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to ignore system authentication issues - some fixes for EL7 New features : - New filters: - postfix-rbl - apache-fakegooglebot.conf - nginx-botsearch - drupal-auth - New actions: - action.d/firewallcmd-multiport and action.d/firewallcmd-allports - action.d/sendmail-geoip-lines.conf - action.d/nsupdate to update DNSBL - New status argument for fail2ban-client Some of the upstream changes for 0.9.3 : - IMPORTANT incompatible changes: * filter.d/roundcube-auth.conf - Changed logpath to 'errors' log (was 'userlogins') * action.d/iptables-common.conf - All calls to iptables command now use -w switch introduced in iptables 1.4.20 (some distribution could have patched their earlier base version as well) to provide this locking mechanism useful under heavy load to avoid contesting on iptables calls. If you need to disable, define 'action.d/iptables-common.local' with empty value for 'lockingopt' in `[Init]` section. * mail-whois-lines, sendmail-geoip-lines and sendmail-whois-lines actions now include by default only the first 1000 log lines in the emails. Adjust <grepopts> to augment the behavior. - New Features: * New filters: - froxlor-auth - Thanks Joern Muehlencord - apache-pass - filter Apache access log for successful authentication * New actions: - shorewall-ipset-proto6 - using proto feature of the Shorewall. Still requires manual pre-configuration of the shorewall. See the action file for detail. * New jails: - pass2allow-ftp - allows FTP traffic after successful HTTP authentication
2015-11-27 16:41:47 +01:00
share/examples/fail2ban/action.d/nsupdate.conf
share/examples/fail2ban/action.d/osx-afctl.conf
share/examples/fail2ban/action.d/osx-ipfw.conf
share/examples/fail2ban/action.d/pf.conf
share/examples/fail2ban/action.d/route.conf
share/examples/fail2ban/action.d/sendmail-buffered.conf
share/examples/fail2ban/action.d/sendmail-common.conf
Updated to 0.9.3. Some of the upstream changes for 0.9.2 : - various typo in config files - filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to ignore system authentication issues - some fixes for EL7 New features : - New filters: - postfix-rbl - apache-fakegooglebot.conf - nginx-botsearch - drupal-auth - New actions: - action.d/firewallcmd-multiport and action.d/firewallcmd-allports - action.d/sendmail-geoip-lines.conf - action.d/nsupdate to update DNSBL - New status argument for fail2ban-client Some of the upstream changes for 0.9.3 : - IMPORTANT incompatible changes: * filter.d/roundcube-auth.conf - Changed logpath to 'errors' log (was 'userlogins') * action.d/iptables-common.conf - All calls to iptables command now use -w switch introduced in iptables 1.4.20 (some distribution could have patched their earlier base version as well) to provide this locking mechanism useful under heavy load to avoid contesting on iptables calls. If you need to disable, define 'action.d/iptables-common.local' with empty value for 'lockingopt' in `[Init]` section. * mail-whois-lines, sendmail-geoip-lines and sendmail-whois-lines actions now include by default only the first 1000 log lines in the emails. Adjust <grepopts> to augment the behavior. - New Features: * New filters: - froxlor-auth - Thanks Joern Muehlencord - apache-pass - filter Apache access log for successful authentication * New actions: - shorewall-ipset-proto6 - using proto feature of the Shorewall. Still requires manual pre-configuration of the shorewall. See the action file for detail. * New jails: - pass2allow-ftp - allows FTP traffic after successful HTTP authentication
2015-11-27 16:41:47 +01:00
share/examples/fail2ban/action.d/sendmail-geoip-lines.conf
share/examples/fail2ban/action.d/sendmail-whois-ipjailmatches.conf
share/examples/fail2ban/action.d/sendmail-whois-ipmatches.conf
share/examples/fail2ban/action.d/sendmail-whois-lines.conf
share/examples/fail2ban/action.d/sendmail-whois-matches.conf
share/examples/fail2ban/action.d/sendmail-whois.conf
share/examples/fail2ban/action.d/sendmail.conf
Updated to 0.9.3. Some of the upstream changes for 0.9.2 : - various typo in config files - filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to ignore system authentication issues - some fixes for EL7 New features : - New filters: - postfix-rbl - apache-fakegooglebot.conf - nginx-botsearch - drupal-auth - New actions: - action.d/firewallcmd-multiport and action.d/firewallcmd-allports - action.d/sendmail-geoip-lines.conf - action.d/nsupdate to update DNSBL - New status argument for fail2ban-client Some of the upstream changes for 0.9.3 : - IMPORTANT incompatible changes: * filter.d/roundcube-auth.conf - Changed logpath to 'errors' log (was 'userlogins') * action.d/iptables-common.conf - All calls to iptables command now use -w switch introduced in iptables 1.4.20 (some distribution could have patched their earlier base version as well) to provide this locking mechanism useful under heavy load to avoid contesting on iptables calls. If you need to disable, define 'action.d/iptables-common.local' with empty value for 'lockingopt' in `[Init]` section. * mail-whois-lines, sendmail-geoip-lines and sendmail-whois-lines actions now include by default only the first 1000 log lines in the emails. Adjust <grepopts> to augment the behavior. - New Features: * New filters: - froxlor-auth - Thanks Joern Muehlencord - apache-pass - filter Apache access log for successful authentication * New actions: - shorewall-ipset-proto6 - using proto feature of the Shorewall. Still requires manual pre-configuration of the shorewall. See the action file for detail. * New jails: - pass2allow-ftp - allows FTP traffic after successful HTTP authentication
2015-11-27 16:41:47 +01:00
share/examples/fail2ban/action.d/shorewall-ipset-proto6.conf
share/examples/fail2ban/action.d/shorewall.conf
share/examples/fail2ban/action.d/smtp.py
share/examples/fail2ban/action.d/symbiosis-blacklist-allports.conf
share/examples/fail2ban/action.d/ufw.conf
share/examples/fail2ban/action.d/xarf-login-attack.conf
share/examples/fail2ban/fail2ban.conf
share/examples/fail2ban/filter.d/3proxy.conf
share/examples/fail2ban/filter.d/apache-auth.conf
share/examples/fail2ban/filter.d/apache-badbots.conf
share/examples/fail2ban/filter.d/apache-botsearch.conf
share/examples/fail2ban/filter.d/apache-common.conf
Updated to 0.9.3. Some of the upstream changes for 0.9.2 : - various typo in config files - filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to ignore system authentication issues - some fixes for EL7 New features : - New filters: - postfix-rbl - apache-fakegooglebot.conf - nginx-botsearch - drupal-auth - New actions: - action.d/firewallcmd-multiport and action.d/firewallcmd-allports - action.d/sendmail-geoip-lines.conf - action.d/nsupdate to update DNSBL - New status argument for fail2ban-client Some of the upstream changes for 0.9.3 : - IMPORTANT incompatible changes: * filter.d/roundcube-auth.conf - Changed logpath to 'errors' log (was 'userlogins') * action.d/iptables-common.conf - All calls to iptables command now use -w switch introduced in iptables 1.4.20 (some distribution could have patched their earlier base version as well) to provide this locking mechanism useful under heavy load to avoid contesting on iptables calls. If you need to disable, define 'action.d/iptables-common.local' with empty value for 'lockingopt' in `[Init]` section. * mail-whois-lines, sendmail-geoip-lines and sendmail-whois-lines actions now include by default only the first 1000 log lines in the emails. Adjust <grepopts> to augment the behavior. - New Features: * New filters: - froxlor-auth - Thanks Joern Muehlencord - apache-pass - filter Apache access log for successful authentication * New actions: - shorewall-ipset-proto6 - using proto feature of the Shorewall. Still requires manual pre-configuration of the shorewall. See the action file for detail. * New jails: - pass2allow-ftp - allows FTP traffic after successful HTTP authentication
2015-11-27 16:41:47 +01:00
share/examples/fail2ban/filter.d/apache-fakegooglebot.conf
share/examples/fail2ban/filter.d/apache-modsecurity.conf
share/examples/fail2ban/filter.d/apache-nohome.conf
share/examples/fail2ban/filter.d/apache-noscript.conf
share/examples/fail2ban/filter.d/apache-overflows.conf
Updated to 0.9.3. Some of the upstream changes for 0.9.2 : - various typo in config files - filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to ignore system authentication issues - some fixes for EL7 New features : - New filters: - postfix-rbl - apache-fakegooglebot.conf - nginx-botsearch - drupal-auth - New actions: - action.d/firewallcmd-multiport and action.d/firewallcmd-allports - action.d/sendmail-geoip-lines.conf - action.d/nsupdate to update DNSBL - New status argument for fail2ban-client Some of the upstream changes for 0.9.3 : - IMPORTANT incompatible changes: * filter.d/roundcube-auth.conf - Changed logpath to 'errors' log (was 'userlogins') * action.d/iptables-common.conf - All calls to iptables command now use -w switch introduced in iptables 1.4.20 (some distribution could have patched their earlier base version as well) to provide this locking mechanism useful under heavy load to avoid contesting on iptables calls. If you need to disable, define 'action.d/iptables-common.local' with empty value for 'lockingopt' in `[Init]` section. * mail-whois-lines, sendmail-geoip-lines and sendmail-whois-lines actions now include by default only the first 1000 log lines in the emails. Adjust <grepopts> to augment the behavior. - New Features: * New filters: - froxlor-auth - Thanks Joern Muehlencord - apache-pass - filter Apache access log for successful authentication * New actions: - shorewall-ipset-proto6 - using proto feature of the Shorewall. Still requires manual pre-configuration of the shorewall. See the action file for detail. * New jails: - pass2allow-ftp - allows FTP traffic after successful HTTP authentication
2015-11-27 16:41:47 +01:00
share/examples/fail2ban/filter.d/apache-pass.conf
share/examples/fail2ban/filter.d/apache-shellshock.conf
share/examples/fail2ban/filter.d/assp.conf
share/examples/fail2ban/filter.d/asterisk.conf
Updated to 0.9.3. Some of the upstream changes for 0.9.2 : - various typo in config files - filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to ignore system authentication issues - some fixes for EL7 New features : - New filters: - postfix-rbl - apache-fakegooglebot.conf - nginx-botsearch - drupal-auth - New actions: - action.d/firewallcmd-multiport and action.d/firewallcmd-allports - action.d/sendmail-geoip-lines.conf - action.d/nsupdate to update DNSBL - New status argument for fail2ban-client Some of the upstream changes for 0.9.3 : - IMPORTANT incompatible changes: * filter.d/roundcube-auth.conf - Changed logpath to 'errors' log (was 'userlogins') * action.d/iptables-common.conf - All calls to iptables command now use -w switch introduced in iptables 1.4.20 (some distribution could have patched their earlier base version as well) to provide this locking mechanism useful under heavy load to avoid contesting on iptables calls. If you need to disable, define 'action.d/iptables-common.local' with empty value for 'lockingopt' in `[Init]` section. * mail-whois-lines, sendmail-geoip-lines and sendmail-whois-lines actions now include by default only the first 1000 log lines in the emails. Adjust <grepopts> to augment the behavior. - New Features: * New filters: - froxlor-auth - Thanks Joern Muehlencord - apache-pass - filter Apache access log for successful authentication * New actions: - shorewall-ipset-proto6 - using proto feature of the Shorewall. Still requires manual pre-configuration of the shorewall. See the action file for detail. * New jails: - pass2allow-ftp - allows FTP traffic after successful HTTP authentication
2015-11-27 16:41:47 +01:00
share/examples/fail2ban/filter.d/botsearch-common.conf
share/examples/fail2ban/filter.d/common.conf
share/examples/fail2ban/filter.d/counter-strike.conf
share/examples/fail2ban/filter.d/courier-auth.conf
share/examples/fail2ban/filter.d/courier-smtp.conf
share/examples/fail2ban/filter.d/cyrus-imap.conf
share/examples/fail2ban/filter.d/directadmin.conf
share/examples/fail2ban/filter.d/dovecot.conf
share/examples/fail2ban/filter.d/dropbear.conf
Updated to 0.9.3. Some of the upstream changes for 0.9.2 : - various typo in config files - filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to ignore system authentication issues - some fixes for EL7 New features : - New filters: - postfix-rbl - apache-fakegooglebot.conf - nginx-botsearch - drupal-auth - New actions: - action.d/firewallcmd-multiport and action.d/firewallcmd-allports - action.d/sendmail-geoip-lines.conf - action.d/nsupdate to update DNSBL - New status argument for fail2ban-client Some of the upstream changes for 0.9.3 : - IMPORTANT incompatible changes: * filter.d/roundcube-auth.conf - Changed logpath to 'errors' log (was 'userlogins') * action.d/iptables-common.conf - All calls to iptables command now use -w switch introduced in iptables 1.4.20 (some distribution could have patched their earlier base version as well) to provide this locking mechanism useful under heavy load to avoid contesting on iptables calls. If you need to disable, define 'action.d/iptables-common.local' with empty value for 'lockingopt' in `[Init]` section. * mail-whois-lines, sendmail-geoip-lines and sendmail-whois-lines actions now include by default only the first 1000 log lines in the emails. Adjust <grepopts> to augment the behavior. - New Features: * New filters: - froxlor-auth - Thanks Joern Muehlencord - apache-pass - filter Apache access log for successful authentication * New actions: - shorewall-ipset-proto6 - using proto feature of the Shorewall. Still requires manual pre-configuration of the shorewall. See the action file for detail. * New jails: - pass2allow-ftp - allows FTP traffic after successful HTTP authentication
2015-11-27 16:41:47 +01:00
share/examples/fail2ban/filter.d/drupal-auth.conf
share/examples/fail2ban/filter.d/ejabberd-auth.conf
share/examples/fail2ban/filter.d/exim-common.conf
share/examples/fail2ban/filter.d/exim-spam.conf
share/examples/fail2ban/filter.d/exim.conf
share/examples/fail2ban/filter.d/freeswitch.conf
Updated to 0.9.3. Some of the upstream changes for 0.9.2 : - various typo in config files - filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to ignore system authentication issues - some fixes for EL7 New features : - New filters: - postfix-rbl - apache-fakegooglebot.conf - nginx-botsearch - drupal-auth - New actions: - action.d/firewallcmd-multiport and action.d/firewallcmd-allports - action.d/sendmail-geoip-lines.conf - action.d/nsupdate to update DNSBL - New status argument for fail2ban-client Some of the upstream changes for 0.9.3 : - IMPORTANT incompatible changes: * filter.d/roundcube-auth.conf - Changed logpath to 'errors' log (was 'userlogins') * action.d/iptables-common.conf - All calls to iptables command now use -w switch introduced in iptables 1.4.20 (some distribution could have patched their earlier base version as well) to provide this locking mechanism useful under heavy load to avoid contesting on iptables calls. If you need to disable, define 'action.d/iptables-common.local' with empty value for 'lockingopt' in `[Init]` section. * mail-whois-lines, sendmail-geoip-lines and sendmail-whois-lines actions now include by default only the first 1000 log lines in the emails. Adjust <grepopts> to augment the behavior. - New Features: * New filters: - froxlor-auth - Thanks Joern Muehlencord - apache-pass - filter Apache access log for successful authentication * New actions: - shorewall-ipset-proto6 - using proto feature of the Shorewall. Still requires manual pre-configuration of the shorewall. See the action file for detail. * New jails: - pass2allow-ftp - allows FTP traffic after successful HTTP authentication
2015-11-27 16:41:47 +01:00
share/examples/fail2ban/filter.d/froxlor-auth.conf
share/examples/fail2ban/filter.d/groupoffice.conf
share/examples/fail2ban/filter.d/gssftpd.conf
share/examples/fail2ban/filter.d/guacamole.conf
share/examples/fail2ban/filter.d/horde.conf
Updated to 0.9.3. Some of the upstream changes for 0.9.2 : - various typo in config files - filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to ignore system authentication issues - some fixes for EL7 New features : - New filters: - postfix-rbl - apache-fakegooglebot.conf - nginx-botsearch - drupal-auth - New actions: - action.d/firewallcmd-multiport and action.d/firewallcmd-allports - action.d/sendmail-geoip-lines.conf - action.d/nsupdate to update DNSBL - New status argument for fail2ban-client Some of the upstream changes for 0.9.3 : - IMPORTANT incompatible changes: * filter.d/roundcube-auth.conf - Changed logpath to 'errors' log (was 'userlogins') * action.d/iptables-common.conf - All calls to iptables command now use -w switch introduced in iptables 1.4.20 (some distribution could have patched their earlier base version as well) to provide this locking mechanism useful under heavy load to avoid contesting on iptables calls. If you need to disable, define 'action.d/iptables-common.local' with empty value for 'lockingopt' in `[Init]` section. * mail-whois-lines, sendmail-geoip-lines and sendmail-whois-lines actions now include by default only the first 1000 log lines in the emails. Adjust <grepopts> to augment the behavior. - New Features: * New filters: - froxlor-auth - Thanks Joern Muehlencord - apache-pass - filter Apache access log for successful authentication * New actions: - shorewall-ipset-proto6 - using proto feature of the Shorewall. Still requires manual pre-configuration of the shorewall. See the action file for detail. * New jails: - pass2allow-ftp - allows FTP traffic after successful HTTP authentication
2015-11-27 16:41:47 +01:00
share/examples/fail2ban/filter.d/ignorecommands/apache-fakegooglebot
share/examples/fail2ban/filter.d/kerio.conf
share/examples/fail2ban/filter.d/lighttpd-auth.conf
share/examples/fail2ban/filter.d/monit.conf
share/examples/fail2ban/filter.d/mysqld-auth.conf
share/examples/fail2ban/filter.d/nagios.conf
share/examples/fail2ban/filter.d/named-refused.conf
Updated to 0.9.3. Some of the upstream changes for 0.9.2 : - various typo in config files - filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to ignore system authentication issues - some fixes for EL7 New features : - New filters: - postfix-rbl - apache-fakegooglebot.conf - nginx-botsearch - drupal-auth - New actions: - action.d/firewallcmd-multiport and action.d/firewallcmd-allports - action.d/sendmail-geoip-lines.conf - action.d/nsupdate to update DNSBL - New status argument for fail2ban-client Some of the upstream changes for 0.9.3 : - IMPORTANT incompatible changes: * filter.d/roundcube-auth.conf - Changed logpath to 'errors' log (was 'userlogins') * action.d/iptables-common.conf - All calls to iptables command now use -w switch introduced in iptables 1.4.20 (some distribution could have patched their earlier base version as well) to provide this locking mechanism useful under heavy load to avoid contesting on iptables calls. If you need to disable, define 'action.d/iptables-common.local' with empty value for 'lockingopt' in `[Init]` section. * mail-whois-lines, sendmail-geoip-lines and sendmail-whois-lines actions now include by default only the first 1000 log lines in the emails. Adjust <grepopts> to augment the behavior. - New Features: * New filters: - froxlor-auth - Thanks Joern Muehlencord - apache-pass - filter Apache access log for successful authentication * New actions: - shorewall-ipset-proto6 - using proto feature of the Shorewall. Still requires manual pre-configuration of the shorewall. See the action file for detail. * New jails: - pass2allow-ftp - allows FTP traffic after successful HTTP authentication
2015-11-27 16:41:47 +01:00
share/examples/fail2ban/filter.d/nginx-botsearch.conf
share/examples/fail2ban/filter.d/nginx-http-auth.conf
share/examples/fail2ban/filter.d/nsd.conf
share/examples/fail2ban/filter.d/openwebmail.conf
share/examples/fail2ban/filter.d/oracleims.conf
share/examples/fail2ban/filter.d/pam-generic.conf
share/examples/fail2ban/filter.d/perdition.conf
share/examples/fail2ban/filter.d/php-url-fopen.conf
share/examples/fail2ban/filter.d/portsentry.conf
Updated to 0.9.3. Some of the upstream changes for 0.9.2 : - various typo in config files - filter.d/postfix-sasl.conf - tweak failregex and add ignoreregex to ignore system authentication issues - some fixes for EL7 New features : - New filters: - postfix-rbl - apache-fakegooglebot.conf - nginx-botsearch - drupal-auth - New actions: - action.d/firewallcmd-multiport and action.d/firewallcmd-allports - action.d/sendmail-geoip-lines.conf - action.d/nsupdate to update DNSBL - New status argument for fail2ban-client Some of the upstream changes for 0.9.3 : - IMPORTANT incompatible changes: * filter.d/roundcube-auth.conf - Changed logpath to 'errors' log (was 'userlogins') * action.d/iptables-common.conf - All calls to iptables command now use -w switch introduced in iptables 1.4.20 (some distribution could have patched their earlier base version as well) to provide this locking mechanism useful under heavy load to avoid contesting on iptables calls. If you need to disable, define 'action.d/iptables-common.local' with empty value for 'lockingopt' in `[Init]` section. * mail-whois-lines, sendmail-geoip-lines and sendmail-whois-lines actions now include by default only the first 1000 log lines in the emails. Adjust <grepopts> to augment the behavior. - New Features: * New filters: - froxlor-auth - Thanks Joern Muehlencord - apache-pass - filter Apache access log for successful authentication * New actions: - shorewall-ipset-proto6 - using proto feature of the Shorewall. Still requires manual pre-configuration of the shorewall. See the action file for detail. * New jails: - pass2allow-ftp - allows FTP traffic after successful HTTP authentication
2015-11-27 16:41:47 +01:00
share/examples/fail2ban/filter.d/postfix-rbl.conf
share/examples/fail2ban/filter.d/postfix-sasl.conf
share/examples/fail2ban/filter.d/postfix.conf
share/examples/fail2ban/filter.d/proftpd.conf
share/examples/fail2ban/filter.d/pure-ftpd.conf
share/examples/fail2ban/filter.d/qmail.conf
share/examples/fail2ban/filter.d/recidive.conf
share/examples/fail2ban/filter.d/roundcube-auth.conf
share/examples/fail2ban/filter.d/selinux-common.conf
share/examples/fail2ban/filter.d/selinux-ssh.conf
share/examples/fail2ban/filter.d/sendmail-auth.conf
share/examples/fail2ban/filter.d/sendmail-reject.conf
share/examples/fail2ban/filter.d/sieve.conf
share/examples/fail2ban/filter.d/sogo-auth.conf
share/examples/fail2ban/filter.d/solid-pop3d.conf
share/examples/fail2ban/filter.d/squid.conf
share/examples/fail2ban/filter.d/squirrelmail.conf
share/examples/fail2ban/filter.d/sshd-ddos.conf
share/examples/fail2ban/filter.d/sshd.conf
share/examples/fail2ban/filter.d/stunnel.conf
share/examples/fail2ban/filter.d/suhosin.conf
share/examples/fail2ban/filter.d/tine20.conf
share/examples/fail2ban/filter.d/uwimap-auth.conf
share/examples/fail2ban/filter.d/vsftpd.conf
share/examples/fail2ban/filter.d/webmin-auth.conf
share/examples/fail2ban/filter.d/wuftpd.conf
share/examples/fail2ban/filter.d/xinetd-fail.conf
share/examples/fail2ban/jail.conf
share/examples/fail2ban/paths-common.conf
share/examples/fail2ban/paths-debian.conf
share/examples/fail2ban/paths-fedora.conf
share/examples/fail2ban/paths-freebsd.conf
share/examples/fail2ban/paths-netbsd.conf
share/examples/fail2ban/paths-osx.conf
share/examples/fail2ban/paths-pkgsrc.conf