Update jail.local

This commit is contained in:
FusionPBX 2018-07-11 19:51:08 -06:00 committed by GitHub
parent 048692db50
commit f0a72884f8
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 17 additions and 42 deletions

View File

@ -1,6 +1,6 @@
[freeswitch-udp]
[freeswitch]
enabled = true
port = 5060,5061,5080,5081
port = 5060:5091
protocol = all
filter = freeswitch
#logpath = /var/log/freeswitch/freeswitch.log
@ -8,25 +8,12 @@ logpath = /usr/local/freeswitch/log/freeswitch.log
maxretry = 5
findtime = 600
banaction = pf
bantime = 600
bantime = 3600
# sendmail-whois[name=FreeSwitch, dest=root, sender=fail2ban@example.org] #no smtp server installed
[freeswitch-tcp]
enabled = true
port = 5060,5061,5080,5081
protocol = all
filter = freeswitch
#logpath = /var/log/freeswitch/freeswitch.log
logpath = /usr/local/freeswitch/log/freeswitch.log
maxretry = 5
findtime = 600
banaction = pf
bantime = 600
# sendmail-whois[name=FreeSwitch, dest=root, sender=fail2ban@example.org] #no smtp server installed
[freeswitch-ip-tcp]
[freeswitch-ip]
enabled = false
port = 5060,5061,5080,5081
port = 5060:5091
protocol = all
filter = freeswitch-ip
#logpath = /var/log/freeswitch/freeswitch.log
@ -36,11 +23,11 @@ findtime = 30
banaction = pf
bantime = 86400
[freeswitch-ip-udp]
[sip-auth-challenge-ip]
enabled = false
port = 5060,5061,5080,5081
port = 5060:5091
protocol = all
filter = freeswitch-ip
filter = sip-auth-challenge-ip
#logpath = /var/log/freeswitch/freeswitch.log
logpath = /usr/local/freeswitch/log/freeswitch.log
maxretry = 1
@ -48,33 +35,21 @@ findtime = 30
banaction = pf
bantime = 86400
[freeswitch-dos-udp]
[sip-auth-challenge]
enabled = true
port = 5060,5061,5080,5081
port = 5060:5091
protocol = all
filter = freeswitch-dos
filter = sip-auth-challenge
#logpath = /var/log/freeswitch/freeswitch.log
logpath = /usr/local/freeswitch/log/freeswitch.log
maxretry = 50
findtime = 30
banaction = pf
bantime = 6000
[freeswitch-dos-tcp]
enabled = true
port = 5060,5061,5080,5081
protocol = all
filter = freeswitch-dos
#logpath = /var/log/freeswitch/freeswitch.log
logpath = /usr/local/freeswitch/log/freeswitch.log
maxretry = 50
findtime = 30
banaction = pf
bantime = 6000
bantime = 7200
[freeswitch-404]
enabled = true
port = 5060,5061,5080,5081
port = 5060:5091
protocol = all
filter = freeswitch-404
#logpath = /var/log/freeswitch/freeswitch.log
@ -94,7 +69,7 @@ logpath = /var/log/auth.log
maxretry = 10
findtime = 600
banaction = pf
bantime = 600
bantime = 3600
[nginx-404]
enabled = true
@ -102,10 +77,10 @@ port = 80,443
protocol = tcp
filter = nginx-404
logpath = /var/log/nginx/access*.log
banaction = pf
bantime = 600
findtime = 60
maxretry = 120
banaction = pf
bantime = 3600
[nginx-dos]
# Based on apache-badbots but a simple IP check (any IP requesting more than
@ -117,6 +92,6 @@ protocol = tcp
filter = nginx-dos
logpath = /var/log/nginx/access*.log
findtime = 60
maxretry = 240
banaction = pf
bantime = 172800
maxretry = 240