diff --git a/filter.d/asterisk-security.conf b/filter.d/asterisk-security.conf new file mode 100644 index 0000000..258904c --- /dev/null +++ b/filter.d/asterisk-security.conf @@ -0,0 +1,17 @@ +## Version 2024/10/15 +# Fail2Ban filter configuration for Asterisk security + +[INCLUDES] +before = common.conf + +[Definition] + +_daemon = asterisk + +failregex = SECURITY.* SecurityEvent="FailedACL".*RemoteAddress=".+?/.+?//.+?".* + SECURITY.* SecurityEvent="InvalidAccountID".*RemoteAddress=".+?/.+?//.+?".* + SECURITY.* SecurityEvent="ChallengeResponseFailed".*RemoteAddress=".+?/.+?//.+?".* + SECURITY.* SecurityEvent="InvalidPassword".*RemoteAddress=".+?/.+?//.+?".* + SECURITY.* SecurityEvent="FailedACL".*RemoteAddress=".+?/.+?//.+?".* + +ignoreregex = Asterisk GIT-master \ No newline at end of file diff --git a/jail.d/asterisk-security.conf b/jail.d/asterisk-security.conf new file mode 100644 index 0000000..aae36ae --- /dev/null +++ b/jail.d/asterisk-security.conf @@ -0,0 +1,9 @@ +## Version 2024/10/15 +# Fail2Ban jail configuration for asterisk security log + +[asterisk-security] +enabled = false +port = 5060,5061 +action = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp] + %(banaction)s[name=%(__name__)s-udp, port="%(port)s", protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp] +logpath = %(remote_logs_path)s/asterisk/security \ No newline at end of file