Skip to content

Commit

Permalink
fix crlf
Browse files Browse the repository at this point in the history
  • Loading branch information
drizuid authored Oct 15, 2024
1 parent 337fbe8 commit 921cd68
Show file tree
Hide file tree
Showing 2 changed files with 24 additions and 24 deletions.
32 changes: 16 additions & 16 deletions filter.d/asterisk-security.conf
Original file line number Diff line number Diff line change
@@ -1,17 +1,17 @@
## Version 2024/10/15
# Fail2Ban filter configuration for Asterisk security
[INCLUDES]
before = common.conf
[Definition]
_daemon = asterisk
failregex = SECURITY.* SecurityEvent="FailedACL".*RemoteAddress=".+?/.+?/<HOST>/.+?".*
SECURITY.* SecurityEvent="InvalidAccountID".*RemoteAddress=".+?/.+?/<HOST>/.+?".*
SECURITY.* SecurityEvent="ChallengeResponseFailed".*RemoteAddress=".+?/.+?/<HOST>/.+?".*
SECURITY.* SecurityEvent="InvalidPassword".*RemoteAddress=".+?/.+?/<HOST>/.+?".*
SECURITY.* SecurityEvent="FailedACL".*RemoteAddress=".+?/.+?/<HOST>/.+?".*
## Version 2024/10/15
# Fail2Ban filter configuration for Asterisk security

[INCLUDES]
before = common.conf

[Definition]

_daemon = asterisk

failregex = SECURITY.* SecurityEvent="FailedACL".*RemoteAddress=".+?/.+?/<HOST>/.+?".*
SECURITY.* SecurityEvent="InvalidAccountID".*RemoteAddress=".+?/.+?/<HOST>/.+?".*
SECURITY.* SecurityEvent="ChallengeResponseFailed".*RemoteAddress=".+?/.+?/<HOST>/.+?".*
SECURITY.* SecurityEvent="InvalidPassword".*RemoteAddress=".+?/.+?/<HOST>/.+?".*
SECURITY.* SecurityEvent="FailedACL".*RemoteAddress=".+?/.+?/<HOST>/.+?".*

ignoreregex = Asterisk GIT-master
16 changes: 8 additions & 8 deletions jail.d/asterisk-security.conf
Original file line number Diff line number Diff line change
@@ -1,9 +1,9 @@
## Version 2024/10/15
# Fail2Ban jail configuration for asterisk security log
[asterisk-security]
enabled = false
port = 5060,5061
action = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
%(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
## Version 2024/10/15
# Fail2Ban jail configuration for asterisk security log

[asterisk-security]
enabled = false
port = 5060,5061
action = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
%(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
logpath = %(remote_logs_path)s/asterisk/security

0 comments on commit 921cd68

Please sign in to comment.