blob: 6c2ea19af88e967c7cc7502fdac4bd3ae884a0df (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
|
# Fail2Ban filter for openssh for Alpine
#
# If you want to protect OpenSSH from being bruteforced by password
# authentication then get public key authentication working before disabling
# PasswordAuthentication in sshd_config.
#
[INCLUDES]
# Read common prefixes. If any customizations available -- read them from
# common.local
before = common.conf
[Definition]
_daemon = sshd
failregex = Failed [-/\w]+ for .* from <HOST> port \d* ssh2
sshd\[.*\]: Invalid user .* from <HOST> port \d*
sshd\[.*\]: Received disconnect from <HOST> port \d*:[0-9]+: \[preauth\]
ignoreregex =
[Init]
# "maxlines" is number of log lines to buffer for multi-line regex searches
maxlines = 10
|