comparison modules/fail2ban/templates/ibb-sshd-bad-user.epp @ 430:79e5fed321fa

Break up SSH bad users regexes The list had got so long that it was failing to compile!
author IBBoard <dev@ibboard.co.uk>
date Sun, 11 Dec 2022 20:27:08 +0000
parents 3e04f35dd0af
children
comparison
equal deleted inserted replaced
429:fa3093f2dc8e 430:79e5fed321fa
9 # host must be matched by a group named "host". The tag "<HOST>" can 9 # host must be matched by a group named "host". The tag "<HOST>" can
10 # be used for standard IP/hostname matching and is only an alias for 10 # be used for standard IP/hostname matching and is only an alias for
11 # (?:::f{4,6}:)?(?P<host>[\w\-.^_]+) 11 # (?:::f{4,6}:)?(?P<host>[\w\-.^_]+)
12 # Values: TEXT 12 # Values: TEXT
13 # 13 #
14 failregex = Failed password for invalid user (<%= join($bad_users, '|') %>)? from <HOST> port [0-9]+ ssh2 14 failregex = <% $bad_users.each |$array| { %> Failed password for invalid user (<%= join($array, '|') %>)? from <HOST> port [0-9]+ ssh2
15 <% } %>
16
15 17
16 # Option: ignoreregex 18 # Option: ignoreregex
17 # Notes.: regex to ignore. If this regex matches, the line is ignored. 19 # Notes.: regex to ignore. If this regex matches, the line is ignored.
18 # Values: TEXT 20 # Values: TEXT
19 # 21 #