FusionPBX
6e49545f15
Update jail.local
2018-01-20 20:11:13 -07:00
FusionPBX
ddd121c997
Rename freeswitch-404.conf to fusionpbx-404.conf
2018-01-20 20:06:44 -07:00
FusionPBX
1a95aeb331
Fail2ban - Fix the delimitter for the port range in jail.local.
2017-11-29 22:26:02 -07:00
FusionPBX
21512467a7
Update jail.local
2017-11-29 19:43:52 -07:00
FusionPBX
fe95015dc7
Update jail.local
2017-11-28 23:02:20 -07:00
FusionPBX
78875548ae
Update jail.local
2017-11-28 22:52:03 -07:00
FusionPBX
37ecd268db
Update jail.local
2017-10-09 11:33:17 -06:00
FusionPBX
609ae00d86
Rename fusionpbx-invalid-mac.conf to fusionpbx-mac.conf
2017-10-09 11:32:37 -06:00
FusionPBX
98e1afe8fe
Update jail.local
2017-10-08 23:58:24 -06:00
FusionPBX
aa78b22568
Update jail.local
2017-10-08 23:49:05 -06:00
FusionPBX
f91c4d3fb6
Update jail.local
2017-10-08 23:24:23 -06:00
FusionPBX
f78137a767
Create fusionpbx-invalid-mac.conf
2017-10-08 22:43:19 -06:00
FusionPBX
b0d9c28ab4
Update jail.local
2017-10-08 22:31:50 -06:00
FusionPBX
d7273a3f5a
Update jail.local
2017-10-08 22:29:31 -06:00
emaktech
a33131c8be
Ban on auth failure instead of challenge ( #113 )
...
Default fail2ban DoS ruleset looks for auth challenges, but auth challenges can be either successful or unsuccessful. Default rule causes problems with larger environments with many registered devices as they have many successful auth challenges with short registration periods.
By the time auth challenges can be made successfully in volume, it's far too late to be worrying about a DoS or brute force attempt - it's already too late. Rule change here will reduce false positives while still providing same level of useful protection.
Maybe also consider reducing maxretry count or increasing findtime in jail.local to catch true failed auth brute force or DoS attempts more easily in conjunction with above change.
This will be more sensitive in detection and should carry lower false positive rate.
2017-09-02 09:09:07 -06:00
FusionPBX
db6815d315
Update jail.local
2017-06-06 23:15:08 -06:00
root
16451807dd
update the file permissions
2017-03-05 06:11:42 +00:00
FusionPBX
e9a1ed3038
jail.local disable the ip ban by default
...
I think this is stopping beginners. Easy to enable.
2017-01-15 00:54:59 -07:00
FusionPBX
922677a65e
Update jail.local
2016-11-25 22:00:58 -07:00
FusionPBX
2e042cf201
Rename freeswitch-inbound.conf to freeswitch-404.conf
2016-11-25 21:30:15 -07:00
FusionPBX
82efcb30d6
Update jail.local
2016-11-25 21:27:24 -07:00
FusionPBX
ce06e5d79c
Update jail.local
2016-11-25 18:16:08 -07:00
FusionPBX
2d0357b1b4
Rename freeswitch-404.conf to freeswitch-inbound.conf
2016-11-25 18:13:49 -07:00
FusionPBX
cbe27f0e88
Create freeswitch-404.conf
...
Fail2ban add inbound routes 404 not found
2016-11-25 18:10:50 -07:00
FusionPBX
76be73890e
Update nginx-404.conf
...
This will only match 404 results, not 404 bytes.
2016-10-26 12:02:48 -06:00
FusionPBX
81d22845b8
Update jail.local
2016-10-26 11:54:02 -06:00
Chris Black
cc3ecea384
nginx-dos should block 443 as well. ( #36 )
2016-08-23 10:16:15 -06:00
Alexey Melnichuk
3bf249ac43
Fix. Bun IP requests ( #25 )
2016-06-30 08:13:55 -06:00
DigiDaz
53b9f40b40
Make ban action more reflective of the attack type ( #13 )
2016-05-28 18:39:14 -06:00
FusionPBX
249b9d74a6
Update jail.local
...
Set the fail2ban to block only web interface for failed authentication attempts.
2016-05-28 13:01:48 -06:00
Mafoo
bf5a253f65
fixes for fail2ban ( #10 )
...
export the command line variables so sub scripts can use them
use sed to update log path is source is used
simplify freeswitch rules to use protocol=all
general tidy up of spacing in files
2016-05-28 12:09:45 -06:00
blackc2004
59516f7708
Add NGINX 404 and DOS filters
2016-05-04 15:58:38 -07:00
FusionPBX
59e5c72f80
Update jail.source
2016-05-04 14:24:24 -06:00
FusionPBX
81b42e420f
Update jail.package
...
Add a new filter for fail2ban - freeswitch-ip
2016-05-04 14:23:17 -06:00
FusionPBX
544f9de6d8
Create freeswitch-ip.conf
2016-05-04 14:20:24 -06:00
markjcrane
5988b7ed7d
Add a shell install script.
2016-04-29 13:24:22 -06:00