view modules/fail2ban/templates/ibb-sshd-bad-user.epp @ 430:79e5fed321fa

Break up SSH bad users regexes The list had got so long that it was failing to compile!
author IBBoard <dev@ibboard.co.uk>
date Sun, 11 Dec 2022 20:27:08 +0000
parents 3e04f35dd0af
children
line wrap: on
line source

<%- | Array $bad_users | -%>
# Fail2Ban configuration file
# Author: IBBoard

[Definition]

# Option:  failregex
# Notes.:  regex to match the password failures messages in the logfile. The
#          host must be matched by a group named "host". The tag "<HOST>" can
#          be used for standard IP/hostname matching and is only an alias for
#          (?:::f{4,6}:)?(?P<host>[\w\-.^_]+)
# Values:  TEXT
#
failregex = <% $bad_users.each |$array| { %>   Failed password for invalid user (<%= join($array, '|') %>)? from <HOST> port [0-9]+ ssh2
<% } %>


# Option:  ignoreregex
# Notes.:  regex to ignore. If this regex matches, the line is ignored.
# Values:  TEXT
#
ignoreregex =