2016-05-29 02:39:14 +02:00
|
|
|
[freeswitch-udp]
|
2016-04-29 21:24:22 +02:00
|
|
|
enabled = true
|
2016-05-28 20:09:45 +02:00
|
|
|
port = 5060,5061,5080,5081
|
|
|
|
|
protocol = all
|
2016-04-29 21:24:22 +02:00
|
|
|
filter = freeswitch
|
|
|
|
|
logpath = /var/log/freeswitch/freeswitch.log
|
2016-05-29 02:39:14 +02:00
|
|
|
action = iptables-multiport[name=freeswitch-udp, port="5060,5061,5080,5081", protocol=udp]
|
2016-04-29 21:24:22 +02:00
|
|
|
maxretry = 5
|
|
|
|
|
findtime = 600
|
|
|
|
|
bantime = 600
|
|
|
|
|
# sendmail-whois[name=FreeSwitch, dest=root, sender=fail2ban@example.org] #no smtp server installed
|
|
|
|
|
|
2016-05-29 02:39:14 +02:00
|
|
|
[freeswitch-tcp]
|
|
|
|
|
enabled = true
|
|
|
|
|
port = 5060,5061,5080,5081
|
|
|
|
|
protocol = all
|
|
|
|
|
filter = freeswitch
|
|
|
|
|
logpath = /var/log/freeswitch/freeswitch.log
|
|
|
|
|
action = iptables-multiport[name=freeswitch-tcp, port="5060,5061,5080,5081", protocol=tcp]
|
|
|
|
|
maxretry = 5
|
|
|
|
|
findtime = 600
|
|
|
|
|
bantime = 600
|
|
|
|
|
# sendmail-whois[name=FreeSwitch, dest=root, sender=fail2ban@example.org] #no smtp server installed
|
|
|
|
|
|
2017-06-07 07:15:08 +02:00
|
|
|
[freeswitch-ip-tcp]
|
|
|
|
|
enabled = false
|
|
|
|
|
port = 5060,5061,5080,5081
|
|
|
|
|
protocol = all
|
|
|
|
|
filter = freeswitch-ip
|
|
|
|
|
logpath = /var/log/freeswitch/freeswitch.log
|
|
|
|
|
action = iptables-multiport[name=freeswitch-ip-tcp, port="5060,5061,5080,5081", protocol=tcp]
|
|
|
|
|
maxretry = 1
|
|
|
|
|
findtime = 30
|
|
|
|
|
bantime = 86400
|
2016-05-29 02:39:14 +02:00
|
|
|
|
2017-06-07 07:15:08 +02:00
|
|
|
[freeswitch-ip-udp]
|
|
|
|
|
enabled = false
|
|
|
|
|
port = 5060,5061,5080,5081
|
|
|
|
|
protocol = all
|
|
|
|
|
filter = freeswitch-ip
|
|
|
|
|
logpath = /var/log/freeswitch/freeswitch.log
|
|
|
|
|
action = iptables-multiport[name=freeswitch-ip-udp, port="5060,5061,5080,5081", protocol=udp]
|
|
|
|
|
maxretry = 1
|
|
|
|
|
findtime = 30
|
|
|
|
|
bantime = 86400
|
2016-05-04 22:23:17 +02:00
|
|
|
|
2016-05-29 02:39:14 +02:00
|
|
|
[freeswitch-dos-udp]
|
2016-05-28 20:09:45 +02:00
|
|
|
enabled = true
|
|
|
|
|
port = 5060,5061,5080,5081
|
|
|
|
|
protocol = all
|
|
|
|
|
filter = freeswitch-dos
|
|
|
|
|
logpath = /var/log/freeswitch/freeswitch.log
|
2016-05-29 02:39:14 +02:00
|
|
|
action = iptables-multiport[name=freeswitch-dos-udp, port="5060,5061,5080,5081", protocol=udp]
|
|
|
|
|
maxretry = 50
|
|
|
|
|
findtime = 30
|
|
|
|
|
bantime = 6000
|
|
|
|
|
|
|
|
|
|
[freeswitch-dos-tcp]
|
|
|
|
|
enabled = true
|
|
|
|
|
port = 5060,5061,5080,5081
|
|
|
|
|
protocol = all
|
|
|
|
|
filter = freeswitch-dos
|
|
|
|
|
logpath = /var/log/freeswitch/freeswitch.log
|
|
|
|
|
action = iptables-multiport[name=freeswitch-dos-tcp, port="5060,5061,5080,5081", protocol=tcp]
|
2016-04-29 21:24:22 +02:00
|
|
|
maxretry = 50
|
|
|
|
|
findtime = 30
|
|
|
|
|
bantime = 6000
|
|
|
|
|
|
2016-11-26 05:27:24 +01:00
|
|
|
[freeswitch-404]
|
2016-11-26 02:16:08 +01:00
|
|
|
enabled = true
|
2016-11-26 05:27:24 +01:00
|
|
|
port = 5060,5061,5080,5081
|
|
|
|
|
protocol = all
|
|
|
|
|
filter = freeswitch-404
|
2016-11-26 06:00:58 +01:00
|
|
|
logpath = /var/log/freeswitch/freeswitch.log
|
2016-11-26 05:27:24 +01:00
|
|
|
action = iptables-allports[name=freeswitch-404, protocol=all]
|
2016-11-26 02:16:08 +01:00
|
|
|
maxretry = 3
|
|
|
|
|
findtime = 300
|
2016-11-26 05:27:24 +01:00
|
|
|
bantime = 86400
|
2016-11-26 02:16:08 +01:00
|
|
|
|
2016-04-29 21:24:22 +02:00
|
|
|
[fusionpbx]
|
|
|
|
|
enabled = true
|
|
|
|
|
port = 80,443
|
|
|
|
|
protocol = tcp
|
|
|
|
|
filter = fusionpbx
|
|
|
|
|
logpath = /var/log/auth.log
|
2016-05-28 21:01:48 +02:00
|
|
|
action = iptables-multiport[name=fusionpbx, port="http,https", protocol=tcp]
|
2016-04-29 21:24:22 +02:00
|
|
|
# sendmail-whois[name=fusionpbx, dest=root, sender=fail2ban@example.org] #no smtp server installed
|
2016-05-28 21:01:48 +02:00
|
|
|
maxretry = 10
|
2016-04-29 21:24:22 +02:00
|
|
|
findtime = 600
|
2016-05-29 02:39:14 +02:00
|
|
|
bantime = 600
|
2016-05-05 00:58:38 +02:00
|
|
|
|
2017-10-09 06:29:31 +02:00
|
|
|
[fusionpbx-invalid-mac]
|
|
|
|
|
enabled = true
|
|
|
|
|
port = 80,443
|
|
|
|
|
protocol = tcp
|
2017-10-09 06:31:50 +02:00
|
|
|
filter = fusionpbx-invalid-mac
|
2017-10-09 07:24:23 +02:00
|
|
|
logpath = /var/log/syslog
|
2017-10-09 07:49:05 +02:00
|
|
|
action = iptables-multiport[name=fusionpbx-invalid-mac, port="http,https", protocol=tcp]
|
|
|
|
|
# sendmail-whois[name=fusionpbx-invalid-mac, dest=root, sender=fail2ban@example.org] #no smtp server installed
|
2017-10-09 06:29:31 +02:00
|
|
|
maxretry = 3
|
|
|
|
|
findtime = 600
|
|
|
|
|
bantime = -1
|
|
|
|
|
|
2016-05-05 00:58:38 +02:00
|
|
|
[nginx-404]
|
2016-05-28 20:09:45 +02:00
|
|
|
enabled = true
|
|
|
|
|
port = 80,443
|
|
|
|
|
protocol = tcp
|
|
|
|
|
filter = nginx-404
|
|
|
|
|
logpath = /var/log/nginx/access*.log
|
|
|
|
|
bantime = 600
|
2016-10-26 19:54:02 +02:00
|
|
|
findtime = 60
|
|
|
|
|
maxretry = 120
|
2016-05-05 00:58:38 +02:00
|
|
|
|
|
|
|
|
[nginx-dos]
|
|
|
|
|
# Based on apache-badbots but a simple IP check (any IP requesting more than
|
|
|
|
|
# 240 pages in 60 seconds, or 4p/s average, is suspicious)
|
2016-05-28 20:09:45 +02:00
|
|
|
enabled = true
|
2016-08-23 18:16:15 +02:00
|
|
|
port = 80,443
|
2016-05-28 20:09:45 +02:00
|
|
|
protocol = tcp
|
|
|
|
|
filter = nginx-dos
|
|
|
|
|
logpath = /var/log/nginx/access*.log
|
2016-05-05 00:58:38 +02:00
|
|
|
findtime = 60
|
2017-10-09 06:29:31 +02:00
|
|
|
bantime = -1
|
2016-05-28 20:09:45 +02:00
|
|
|
maxretry = 240
|