Fail2ban
Jump to navigation
Jump to search
Installation
# emerge fail2ban
# /etc/init.d/iptables save
# rc-update add iptables default
# rc-update add fail2ban default
syslog-ng configuration
File: /etc/syslog-ng/syslog-ng.conf
source src { system(); internal(); };
destination authlog { file("/var/log/auth.log"); };
filter f_authpriv { facility(auth, authpriv); };
log { source(src); filter(f_authpriv); destination(authlog); };
destination messages { file("/var/log/messages"); };
# touch /var/log/auth.log
# chmod 600 /var/log/auth.log
# /etc/init.d/syslog-ng restart
Fail2ban configuration (0.9.x)
Be sure to also enable the required Kernel options for iptables.
Enable the sshd jails and fail2ban reporting via email
File: /etc/fail2ban/jail.local
[DEFAULT] bantime = 86400 maxretry = 3 destemail = yourmail@domain.local sender = fail2ban@hostname action = %(action_mwl)s [sshd] enabled = true
Optional: Disable the new sqlite feature
File: /etc/fail2ban/fail2ban.local
[Definition] dbfile = None
Optional: Set the sshd log file path (default is auth.log)
File: /etc/fail2ban/paths-overrides.local
[DEFAULT] sshd_log = /var/log/sshd.log
# /etc/init.d/fail2ban start