Created custom jail: UFW-probe to catch port-probing.
This commit is contained in:
parent
f03c94c8eb
commit
3268998234
31
.vscode/settings.json
vendored
Normal file
31
.vscode/settings.json
vendored
Normal file
@ -0,0 +1,31 @@
|
||||
{
|
||||
"cSpell.enabledLanguageIds": [
|
||||
"asciidoc",
|
||||
"c",
|
||||
"cpp",
|
||||
"csharp",
|
||||
"css",
|
||||
"go",
|
||||
"handlebars",
|
||||
"html",
|
||||
"jade",
|
||||
"javascript",
|
||||
"javascriptreact",
|
||||
"json",
|
||||
"latex",
|
||||
"less",
|
||||
"markdown",
|
||||
"php",
|
||||
"plaintext",
|
||||
"properties",
|
||||
"pub",
|
||||
"python",
|
||||
"restructuredtext",
|
||||
"rust",
|
||||
"scss",
|
||||
"text",
|
||||
"typescript",
|
||||
"typescriptreact",
|
||||
"yml"
|
||||
]
|
||||
}
|
25
etc/fail2ban/jail.d/ufw-probe.conf
Normal file
25
etc/fail2ban/jail.d/ufw-probe.conf
Normal file
@ -0,0 +1,25 @@
|
||||
[ufw-probe]
|
||||
|
||||
# We specify all ports since probing attacks are not limited to any one port.
|
||||
port = all
|
||||
|
||||
# This should be specified in your jail.conf but we'll put it here just in case.
|
||||
# The localhost might have reasons to probe itself, so it should never be
|
||||
# blocked.
|
||||
ignoreip = 127.0.0.1/8 ::1
|
||||
|
||||
# By default, UFW logs to this location. Update as necessary to suit your
|
||||
# enviroment.
|
||||
logpath = /var/log/ufw.log
|
||||
|
||||
# Although timeframes are set in the jail.local, you might want to independently
|
||||
# control them for this particular filter so it's more/less aggressive.
|
||||
maxretry = 5
|
||||
findtime = 300
|
||||
|
||||
# Because this is a custom filter, we need to point F2B to our custom filter. If
|
||||
# you changed the name of that filter file, then update it here without the
|
||||
# '.conf' part.
|
||||
filter = ufw-probe
|
||||
|
||||
enabled = true
|
Loading…
Reference in New Issue
Block a user