view common/fail2ban/ibb-sshd-bad-user.conf @ 208:2db41da29948 puppet-3.6

Blacklist more SSH username probes
author IBBoard <dev@ibboard.co.uk>
date Wed, 26 Jun 2019 20:32:42 +0100
parents 2f72fc5c4441
children 098cd85795f6
line wrap: on
line source

# Fail2Ban configuration file
# Author: IBBoard

[Definition]

# Option:  failregex
# Notes.:  regex to match the password failures messages in the logfile. The
#          host must be matched by a group named "host". The tag "<HOST>" can
#          be used for standard IP/hostname matching and is only an alias for
#          (?:::f{4,6}:)?(?P<host>[\w\-.^_]+)
# Values:  TEXT
#
failregex = Failed password for invalid user ([0-9a-z][0-9a-z]?|ec2-user|postgres|postfix|ansible|oracle|nagios|git(olite?|blit|lab(_ci)?|[0-9]+)?|s?ftp(user|home|test)|hadoop|zabbix|student|ubuntu|teamspeak3?|ts3(serv(er)?|(music)?bot)?|jsboss|guest|(cs(go|cz)|mc)(server|srv)|minecraft|tomcat|applmgr|usuario|nexus|weblogic|vagrant|zimbra|jira|vyatta|qhsupport|cemergen|redmine|sinusbot|debian|asterisk|aptproxy|facebook|linode|kodi|mongodb|oraprod|proftpd|harvard|(www|web)-?(admin|run|user|data)|uuu|sshd[0-9]*|squid|write|rpc(user)?|WinD3str0y|sshusr|devteam|gmail|inssftp|master|(nfs)?nobody|daemon|squirrelmail|testing|testman|testftp|pgsql|sales[0-9]+|operator|(user|server)[0-9]+|amavisd?|software|download|pay_pal|desktop|opscode|noc|deploy|geniuz|steam(cmd)?|samba[0-9]*|screen|alumni|abc[0-9]*|operador|USERID|ggc_user|NpC|man|vhbackup|netdump|library|account[0-9]*|mysquel|(test)?username|pentaho|privoxy|abused|create|e-shop|uftp|comercial|danger|info|nasa|faxadmin|majordomo|db2adm|gdm|filter|mailer|www|sysadmin|PlcmSpIp(PlcmSpIp)?|coinadmin|amsftp|papernet|adm|webserver|fuser|chef|edu(cation)?|staffc|build|ventrilo) from <HOST> port [0-9]+ ssh2

# Option:  ignoreregex
# Notes.:  regex to ignore. If this regex matches, the line is ignored.
# Values:  TEXT
#
ignoreregex =