Skip to content

Commit

Permalink
Merge branch 'dagbrown-fail2ban'
Browse files Browse the repository at this point in the history
  • Loading branch information
Ratler committed Sep 20, 2014
2 parents dddca5c + 97a6649 commit 0c8e9b1
Show file tree
Hide file tree
Showing 5 changed files with 36 additions and 0 deletions.
3 changes: 3 additions & 0 deletions security/fail2ban/BUILD
@@ -0,0 +1,3 @@
python setup.py build_ext -i &&
prepare_install &&
python setup.py install
2 changes: 2 additions & 0 deletions security/fail2ban/DEPENDS
@@ -0,0 +1,2 @@
depends iptables
depends Python
16 changes: 16 additions & 0 deletions security/fail2ban/DETAILS
@@ -0,0 +1,16 @@
MODULE=fail2ban
VERSION=0.8.13
SOURCE=${MODULE}-${VERSION}.tar.gz
SOURCE_URL=https://github.com/fail2ban/fail2ban/releases/download/$VERSION/
SOURCE_VFY=sha256:854e641b194fa76e2b9579e4440e9b6dad4055bdd316b109df639658bfc7007f
WEB_SITE="http://www.find2ban.org/"
ENTERED=20140806
UPDATED=20140806
SHORT="Log file scanner to detect malicious activity"
cat << EOF
Fail2ban scans log files (e.g. /var/log/apache/error_log) and bans IPs
that show the malicious signs -- too many password failures, seeking for
exploits, etc. Generally Fail2Ban is then used to update firewall rules
to reject the IP addresses for a specified amount of time, although any
arbitrary other action (e.g. sending an email) could also be configured.
EOF
14 changes: 14 additions & 0 deletions security/fail2ban/systemd.d/fail2ban.service
@@ -0,0 +1,14 @@
[Unit]
Description=Fail2ban security service
After=syslog.target network.target

[Service]
Type=forking
PIDFile=/run/fail2ban/fail2ban.pid
ExecStart=/usr/bin/fail2ban-client -x start
ExecReload=/usr/bin/fail2ban-client reload
ExecStop=/usr/bin/fail2ban-client stop
Restart=always

[Install]
WantedBy=multi-user.target
1 change: 1 addition & 0 deletions security/fail2ban/tmpfiles.d/fail2ban.conf
@@ -0,0 +1 @@
D /run/fail2ban 0755 root root -

0 comments on commit 0c8e9b1

Please sign in to comment.