From 48e168f1a398f04444969621ad1763c80feb9921 Mon Sep 17 00:00:00 2001 From: bms8197 Date: Fri, 17 Jun 2022 10:03:53 +0300 Subject: [PATCH] committing changes in /etc made by "-bash" Package changes: --- .etckeeper | 183 +---- fail2ban/action.d/abuseipdb.conf | 104 --- fail2ban/action.d/apf.conf | 25 - fail2ban/action.d/badips.conf | 19 - .../action.d/{badips.py => badips.py.rpmsave} | 0 fail2ban/action.d/blocklist_de.conf | 84 --- fail2ban/action.d/cloudflare.conf | 83 --- fail2ban/action.d/dshield.conf | 207 ------ fail2ban/action.d/dummy.conf | 63 -- fail2ban/action.d/firewallcmd-allports.conf | 45 -- fail2ban/action.d/firewallcmd-common.conf | 76 -- fail2ban/action.d/firewallcmd-ipset.conf | 88 --- fail2ban/action.d/firewallcmd-multiport.conf | 26 - fail2ban/action.d/firewallcmd-new.conf | 47 -- .../action.d/firewallcmd-rich-logging.conf | 29 - fail2ban/action.d/firewallcmd-rich-rules.conf | 44 -- fail2ban/action.d/helpers-common.conf | 17 - fail2ban/action.d/iptables-allports.conf | 55 -- ...mmon.conf => iptables-common.conf.rpmsave} | 0 fail2ban/action.d/iptables-ipset-proto4.conf | 65 -- .../iptables-ipset-proto6-allports.conf | 87 --- fail2ban/action.d/iptables-ipset-proto6.conf | 87 --- fail2ban/action.d/iptables-multiport-log.conf | 68 -- fail2ban/action.d/iptables-multiport.conf | 52 -- fail2ban/action.d/iptables-new.conf | 54 -- .../action.d/iptables-xt_recent-echo.conf | 79 -- fail2ban/action.d/iptables.conf | 52 -- fail2ban/action.d/mail-whois-common.conf | 28 - fail2ban/action.d/mynetwatchman.conf | 143 ---- fail2ban/action.d/netscaler.conf | 33 - fail2ban/action.d/nftables-allports.conf | 17 - fail2ban/action.d/nftables-multiport.conf | 17 - fail2ban/action.d/nftables.conf | 203 ----- fail2ban/action.d/nginx-block-map.conf | 110 --- fail2ban/action.d/npf.conf | 61 -- fail2ban/action.d/nsupdate.conf | 114 --- fail2ban/action.d/route.conf | 29 - fail2ban/action.d/sendmail-buffered.conf | 99 --- fail2ban/action.d/sendmail-common.conf | 77 -- fail2ban/action.d/sendmail-geoip-lines.conf | 59 -- .../sendmail-whois-ipjailmatches.conf | 41 - .../action.d/sendmail-whois-ipmatches.conf | 41 - fail2ban/action.d/sendmail-whois-lines.conf | 52 -- fail2ban/action.d/sendmail-whois-matches.conf | 41 - fail2ban/action.d/sendmail-whois.conf | 40 - fail2ban/action.d/sendmail.conf | 37 - fail2ban/action.d/shorewall-ipset-proto6.conf | 93 --- .../action.d/{smtp.py => smtp.py.rpmsave} | 0 .../symbiosis-blacklist-allports.conf | 55 -- fail2ban/action.d/xarf-login-attack.conf | 143 ---- .../{fail2ban.conf => fail2ban.conf.rpmsave} | 0 fail2ban/filter.d/3proxy.conf | 20 - fail2ban/filter.d/apache-auth.conf | 71 -- fail2ban/filter.d/apache-badbots.conf | 24 - fail2ban/filter.d/apache-botsearch.conf | 39 - fail2ban/filter.d/apache-common.conf | 44 -- fail2ban/filter.d/apache-fakegooglebot.conf | 16 - fail2ban/filter.d/apache-modsecurity.conf | 19 - fail2ban/filter.d/apache-nohome.conf | 20 - fail2ban/filter.d/apache-noscript.conf | 37 - fail2ban/filter.d/apache-overflows.conf | 40 - fail2ban/filter.d/apache-pass.conf | 19 - fail2ban/filter.d/apache-shellshock.conf | 28 - fail2ban/filter.d/assp.conf | 46 -- fail2ban/filter.d/asterisk.conf | 55 -- fail2ban/filter.d/bitwarden.conf | 13 - fail2ban/filter.d/botsearch-common.conf | 19 - fail2ban/filter.d/centreon.conf | 9 - fail2ban/filter.d/common.conf | 89 --- fail2ban/filter.d/counter-strike.conf | 15 - fail2ban/filter.d/courier-auth.conf | 21 - fail2ban/filter.d/courier-smtp.conf | 22 - fail2ban/filter.d/cyrus-imap.conf | 20 - fail2ban/filter.d/directadmin.conf | 22 - fail2ban/filter.d/domino-smtp.conf | 50 -- .../{dovecot.conf => dovecot.conf.rpmsave} | 0 fail2ban/filter.d/dropbear.conf | 50 -- fail2ban/filter.d/drupal-auth.conf | 26 - fail2ban/filter.d/ejabberd-auth.conf | 40 - fail2ban/filter.d/exim-common.conf | 20 - fail2ban/filter.d/exim-spam.conf | 50 -- fail2ban/filter.d/exim.conf | 54 -- fail2ban/filter.d/freeswitch.conf | 58 -- fail2ban/filter.d/froxlor-auth.conf | 40 - fail2ban/filter.d/gitlab.conf | 6 - fail2ban/filter.d/grafana.conf | 9 - fail2ban/filter.d/groupoffice.conf | 14 - fail2ban/filter.d/gssftpd.conf | 18 - fail2ban/filter.d/guacamole.conf | 51 -- fail2ban/filter.d/haproxy-http-auth.conf | 37 - fail2ban/filter.d/horde.conf | 16 - ...googlebot => apache-fakegooglebot.rpmsave} | 0 fail2ban/filter.d/kerio.conf | 24 - fail2ban/filter.d/lighttpd-auth.conf | 10 - fail2ban/filter.d/mongodb-auth.conf | 49 -- fail2ban/filter.d/monit.conf | 25 - fail2ban/filter.d/murmur.conf | 34 - fail2ban/filter.d/mysqld-auth.conf | 32 - fail2ban/filter.d/nagios.conf | 17 - ...efused.conf => named-refused.conf.rpmsave} | 0 ...arch.conf => nginx-botsearch.conf.rpmsave} | 0 fail2ban/filter.d/nginx-http-auth.conf | 17 - fail2ban/filter.d/nginx-limit-req.conf | 46 -- fail2ban/filter.d/nsd.conf | 31 - fail2ban/filter.d/openhab.conf | 15 - fail2ban/filter.d/openwebmail.conf | 15 - fail2ban/filter.d/oracleims.conf | 63 -- fail2ban/filter.d/pam-generic.conf | 33 - fail2ban/filter.d/perdition.conf | 18 - fail2ban/filter.d/php-url-fopen.conf | 23 - fail2ban/filter.d/phpmyadmin-syslog.conf | 18 - fail2ban/filter.d/portsentry.conf | 15 - fail2ban/filter.d/postfix.conf | 80 -- fail2ban/filter.d/proftpd.conf | 33 - fail2ban/filter.d/pure-ftpd.conf | 40 - fail2ban/filter.d/qmail.conf | 31 - .../{recidive.conf => recidive.conf.rpmsave} | 0 fail2ban/filter.d/roundcube-auth.conf | 39 - fail2ban/filter.d/screensharingd.conf | 31 - fail2ban/filter.d/selinux-common.conf | 23 - fail2ban/filter.d/selinux-ssh.conf | 25 - fail2ban/filter.d/sendmail-auth.conf | 25 - fail2ban/filter.d/sendmail-reject.conf | 68 -- fail2ban/filter.d/sieve.conf | 18 - fail2ban/filter.d/slapd.conf | 25 - fail2ban/filter.d/softethervpn.conf | 9 - fail2ban/filter.d/sogo-auth.conf | 22 - fail2ban/filter.d/solid-pop3d.conf | 32 - fail2ban/filter.d/squid.conf | 16 - fail2ban/filter.d/squirrelmail.conf | 12 - .../filter.d/{sshd.conf => sshd.conf.rpmsave} | 0 fail2ban/filter.d/stunnel.conf | 13 - fail2ban/filter.d/suhosin.conf | 28 - fail2ban/filter.d/tine20.conf | 24 - fail2ban/filter.d/traefik-auth.conf | 76 -- fail2ban/filter.d/uwimap-auth.conf | 17 - fail2ban/filter.d/vsftpd.conf | 22 - fail2ban/filter.d/webmin-auth.conf | 22 - fail2ban/filter.d/wuftpd.conf | 22 - fail2ban/filter.d/xinetd-fail.conf | 29 - fail2ban/filter.d/znc-adminlog.conf | 34 - fail2ban/filter.d/zoneminder.conf | 21 - fail2ban/{jail.conf => jail.conf.rpmsave} | 0 fail2ban/jail.d/00-firewalld.conf | 6 - fail2ban/paths-common.conf | 96 --- fail2ban/paths-fedora.conf | 42 -- firewalld/firewalld.conf | 84 --- firewalld/lockdown-whitelist.xml | 7 - logrotate.d/{fail2ban => fail2ban.rpmsave} | 0 logrotate.d/firewalld | 7 - modprobe.d/firewalld-sysctls.conf | 1 - nftables/main.nft | 64 -- nftables/nat.nft | 30 - nftables/osf/pf.os | 703 ------------------ nftables/router.nft | 16 - sysconfig/ebtables-config | 11 - sysconfig/firewalld | 3 - sysconfig/nftables.conf | 8 - .../multi-user.target.wants/fail2ban.service | 1 - 159 files changed, 12 insertions(+), 6908 deletions(-) delete mode 100644 fail2ban/action.d/abuseipdb.conf delete mode 100644 fail2ban/action.d/apf.conf delete mode 100644 fail2ban/action.d/badips.conf rename fail2ban/action.d/{badips.py => badips.py.rpmsave} (100%) delete mode 100644 fail2ban/action.d/blocklist_de.conf delete mode 100644 fail2ban/action.d/cloudflare.conf delete mode 100644 fail2ban/action.d/dshield.conf delete mode 100644 fail2ban/action.d/dummy.conf delete mode 100644 fail2ban/action.d/firewallcmd-allports.conf delete mode 100644 fail2ban/action.d/firewallcmd-common.conf delete mode 100644 fail2ban/action.d/firewallcmd-ipset.conf delete mode 100644 fail2ban/action.d/firewallcmd-multiport.conf delete mode 100644 fail2ban/action.d/firewallcmd-new.conf delete mode 100644 fail2ban/action.d/firewallcmd-rich-logging.conf delete mode 100644 fail2ban/action.d/firewallcmd-rich-rules.conf delete mode 100644 fail2ban/action.d/helpers-common.conf delete mode 100644 fail2ban/action.d/iptables-allports.conf rename fail2ban/action.d/{iptables-common.conf => iptables-common.conf.rpmsave} (100%) delete mode 100644 fail2ban/action.d/iptables-ipset-proto4.conf delete mode 100644 fail2ban/action.d/iptables-ipset-proto6-allports.conf delete mode 100644 fail2ban/action.d/iptables-ipset-proto6.conf delete mode 100644 fail2ban/action.d/iptables-multiport-log.conf delete mode 100644 fail2ban/action.d/iptables-multiport.conf delete mode 100644 fail2ban/action.d/iptables-new.conf delete mode 100644 fail2ban/action.d/iptables-xt_recent-echo.conf delete mode 100644 fail2ban/action.d/iptables.conf delete mode 100644 fail2ban/action.d/mail-whois-common.conf delete mode 100644 fail2ban/action.d/mynetwatchman.conf delete mode 100644 fail2ban/action.d/netscaler.conf delete mode 100644 fail2ban/action.d/nftables-allports.conf delete mode 100644 fail2ban/action.d/nftables-multiport.conf delete mode 100644 fail2ban/action.d/nftables.conf delete mode 100644 fail2ban/action.d/nginx-block-map.conf delete mode 100644 fail2ban/action.d/npf.conf delete mode 100644 fail2ban/action.d/nsupdate.conf delete mode 100644 fail2ban/action.d/route.conf delete mode 100644 fail2ban/action.d/sendmail-buffered.conf delete mode 100644 fail2ban/action.d/sendmail-common.conf delete mode 100644 fail2ban/action.d/sendmail-geoip-lines.conf delete mode 100644 fail2ban/action.d/sendmail-whois-ipjailmatches.conf delete mode 100644 fail2ban/action.d/sendmail-whois-ipmatches.conf delete mode 100644 fail2ban/action.d/sendmail-whois-lines.conf delete mode 100644 fail2ban/action.d/sendmail-whois-matches.conf delete mode 100644 fail2ban/action.d/sendmail-whois.conf delete mode 100644 fail2ban/action.d/sendmail.conf delete mode 100644 fail2ban/action.d/shorewall-ipset-proto6.conf rename fail2ban/action.d/{smtp.py => smtp.py.rpmsave} (100%) delete mode 100644 fail2ban/action.d/symbiosis-blacklist-allports.conf delete mode 100644 fail2ban/action.d/xarf-login-attack.conf rename fail2ban/{fail2ban.conf => fail2ban.conf.rpmsave} (100%) delete mode 100644 fail2ban/filter.d/3proxy.conf delete mode 100644 fail2ban/filter.d/apache-auth.conf delete mode 100644 fail2ban/filter.d/apache-badbots.conf delete mode 100644 fail2ban/filter.d/apache-botsearch.conf delete mode 100644 fail2ban/filter.d/apache-common.conf delete mode 100644 fail2ban/filter.d/apache-fakegooglebot.conf delete mode 100644 fail2ban/filter.d/apache-modsecurity.conf delete mode 100644 fail2ban/filter.d/apache-nohome.conf delete mode 100644 fail2ban/filter.d/apache-noscript.conf delete mode 100644 fail2ban/filter.d/apache-overflows.conf delete mode 100644 fail2ban/filter.d/apache-pass.conf delete mode 100644 fail2ban/filter.d/apache-shellshock.conf delete mode 100644 fail2ban/filter.d/assp.conf delete mode 100644 fail2ban/filter.d/asterisk.conf delete mode 100644 fail2ban/filter.d/bitwarden.conf delete mode 100644 fail2ban/filter.d/botsearch-common.conf delete mode 100644 fail2ban/filter.d/centreon.conf delete mode 100644 fail2ban/filter.d/common.conf delete mode 100644 fail2ban/filter.d/counter-strike.conf delete mode 100644 fail2ban/filter.d/courier-auth.conf delete mode 100644 fail2ban/filter.d/courier-smtp.conf delete mode 100644 fail2ban/filter.d/cyrus-imap.conf delete mode 100644 fail2ban/filter.d/directadmin.conf delete mode 100644 fail2ban/filter.d/domino-smtp.conf rename fail2ban/filter.d/{dovecot.conf => dovecot.conf.rpmsave} (100%) delete mode 100644 fail2ban/filter.d/dropbear.conf delete mode 100644 fail2ban/filter.d/drupal-auth.conf delete mode 100644 fail2ban/filter.d/ejabberd-auth.conf delete mode 100644 fail2ban/filter.d/exim-common.conf delete mode 100644 fail2ban/filter.d/exim-spam.conf delete mode 100644 fail2ban/filter.d/exim.conf delete mode 100644 fail2ban/filter.d/freeswitch.conf delete mode 100644 fail2ban/filter.d/froxlor-auth.conf delete mode 100644 fail2ban/filter.d/gitlab.conf delete mode 100644 fail2ban/filter.d/grafana.conf delete mode 100644 fail2ban/filter.d/groupoffice.conf delete mode 100644 fail2ban/filter.d/gssftpd.conf delete mode 100644 fail2ban/filter.d/guacamole.conf delete mode 100644 fail2ban/filter.d/haproxy-http-auth.conf delete mode 100644 fail2ban/filter.d/horde.conf rename fail2ban/filter.d/ignorecommands/{apache-fakegooglebot => apache-fakegooglebot.rpmsave} (100%) delete mode 100644 fail2ban/filter.d/kerio.conf delete mode 100644 fail2ban/filter.d/lighttpd-auth.conf delete mode 100644 fail2ban/filter.d/mongodb-auth.conf delete mode 100644 fail2ban/filter.d/monit.conf delete mode 100644 fail2ban/filter.d/murmur.conf delete mode 100644 fail2ban/filter.d/mysqld-auth.conf delete mode 100644 fail2ban/filter.d/nagios.conf rename fail2ban/filter.d/{named-refused.conf => named-refused.conf.rpmsave} (100%) rename fail2ban/filter.d/{nginx-botsearch.conf => nginx-botsearch.conf.rpmsave} (100%) delete mode 100644 fail2ban/filter.d/nginx-http-auth.conf delete mode 100644 fail2ban/filter.d/nginx-limit-req.conf delete mode 100644 fail2ban/filter.d/nsd.conf delete mode 100644 fail2ban/filter.d/openhab.conf delete mode 100644 fail2ban/filter.d/openwebmail.conf delete mode 100644 fail2ban/filter.d/oracleims.conf delete mode 100644 fail2ban/filter.d/pam-generic.conf delete mode 100644 fail2ban/filter.d/perdition.conf delete mode 100644 fail2ban/filter.d/php-url-fopen.conf delete mode 100644 fail2ban/filter.d/phpmyadmin-syslog.conf delete mode 100644 fail2ban/filter.d/portsentry.conf delete mode 100644 fail2ban/filter.d/postfix.conf delete mode 100644 fail2ban/filter.d/proftpd.conf delete mode 100644 fail2ban/filter.d/pure-ftpd.conf delete mode 100644 fail2ban/filter.d/qmail.conf rename fail2ban/filter.d/{recidive.conf => recidive.conf.rpmsave} (100%) delete mode 100644 fail2ban/filter.d/roundcube-auth.conf delete mode 100644 fail2ban/filter.d/screensharingd.conf delete mode 100644 fail2ban/filter.d/selinux-common.conf delete mode 100644 fail2ban/filter.d/selinux-ssh.conf delete mode 100644 fail2ban/filter.d/sendmail-auth.conf delete mode 100644 fail2ban/filter.d/sendmail-reject.conf delete mode 100644 fail2ban/filter.d/sieve.conf delete mode 100644 fail2ban/filter.d/slapd.conf delete mode 100644 fail2ban/filter.d/softethervpn.conf delete mode 100644 fail2ban/filter.d/sogo-auth.conf delete mode 100644 fail2ban/filter.d/solid-pop3d.conf delete mode 100644 fail2ban/filter.d/squid.conf delete mode 100644 fail2ban/filter.d/squirrelmail.conf rename fail2ban/filter.d/{sshd.conf => sshd.conf.rpmsave} (100%) delete mode 100644 fail2ban/filter.d/stunnel.conf delete mode 100644 fail2ban/filter.d/suhosin.conf delete mode 100644 fail2ban/filter.d/tine20.conf delete mode 100644 fail2ban/filter.d/traefik-auth.conf delete mode 100644 fail2ban/filter.d/uwimap-auth.conf delete mode 100644 fail2ban/filter.d/vsftpd.conf delete mode 100644 fail2ban/filter.d/webmin-auth.conf delete mode 100644 fail2ban/filter.d/wuftpd.conf delete mode 100644 fail2ban/filter.d/xinetd-fail.conf delete mode 100644 fail2ban/filter.d/znc-adminlog.conf delete mode 100644 fail2ban/filter.d/zoneminder.conf rename fail2ban/{jail.conf => jail.conf.rpmsave} (100%) delete mode 100644 fail2ban/jail.d/00-firewalld.conf delete mode 100644 fail2ban/paths-common.conf delete mode 100644 fail2ban/paths-fedora.conf delete mode 100644 firewalld/firewalld.conf delete mode 100644 firewalld/lockdown-whitelist.xml rename logrotate.d/{fail2ban => fail2ban.rpmsave} (100%) delete mode 100644 logrotate.d/firewalld delete mode 100644 modprobe.d/firewalld-sysctls.conf delete mode 100644 nftables/main.nft delete mode 100644 nftables/nat.nft delete mode 100644 nftables/osf/pf.os delete mode 100644 nftables/router.nft delete mode 100644 sysconfig/ebtables-config delete mode 100644 sysconfig/firewalld delete mode 100644 sysconfig/nftables.conf delete mode 120000 systemd/system/multi-user.target.wants/fail2ban.service diff --git a/.etckeeper b/.etckeeper index cd5837b..f128a5c 100755 --- a/.etckeeper +++ b/.etckeeper @@ -22,12 +22,6 @@ mkdir -p './dnf/aliases.d' mkdir -p './dnf/modules.defaults.d' mkdir -p './dnf/plugins/copr.d' mkdir -p './exports.d' -mkdir -p './fail2ban/fail2ban.d' -mkdir -p './firewalld/helpers' -mkdir -p './firewalld/icmptypes' -mkdir -p './firewalld/ipsets' -mkdir -p './firewalld/policies' -mkdir -p './firewalld/services' mkdir -p './glvnd' mkdir -p './gnupg' mkdir -p './groff/site-font' @@ -679,181 +673,39 @@ maybe chmod 0644 'exports' maybe chmod 0755 'exports.d' maybe chmod 0755 'fail2ban' maybe chmod 0755 'fail2ban/action.d' -maybe chmod 0644 'fail2ban/action.d/abuseipdb.conf' -maybe chmod 0644 'fail2ban/action.d/apf.conf' -maybe chmod 0644 'fail2ban/action.d/badips.conf' -maybe chmod 0644 'fail2ban/action.d/badips.py' maybe chmod 0644 'fail2ban/action.d/badips.py.rpmnew' -maybe chmod 0644 'fail2ban/action.d/blocklist_de.conf' -maybe chmod 0644 'fail2ban/action.d/cloudflare.conf' -maybe chmod 0644 'fail2ban/action.d/dshield.conf' -maybe chmod 0644 'fail2ban/action.d/dummy.conf' -maybe chmod 0644 'fail2ban/action.d/firewallcmd-allports.conf' -maybe chmod 0644 'fail2ban/action.d/firewallcmd-common.conf' -maybe chmod 0644 'fail2ban/action.d/firewallcmd-ipset.conf' -maybe chmod 0644 'fail2ban/action.d/firewallcmd-multiport.conf' -maybe chmod 0644 'fail2ban/action.d/firewallcmd-new.conf' -maybe chmod 0644 'fail2ban/action.d/firewallcmd-rich-logging.conf' -maybe chmod 0644 'fail2ban/action.d/firewallcmd-rich-rules.conf' -maybe chmod 0644 'fail2ban/action.d/helpers-common.conf' -maybe chmod 0644 'fail2ban/action.d/iptables-allports.conf' -maybe chmod 0644 'fail2ban/action.d/iptables-common.conf' -maybe chmod 0644 'fail2ban/action.d/iptables-ipset-proto4.conf' -maybe chmod 0644 'fail2ban/action.d/iptables-ipset-proto6-allports.conf' -maybe chmod 0644 'fail2ban/action.d/iptables-ipset-proto6.conf' +maybe chmod 0644 'fail2ban/action.d/badips.py.rpmsave' +maybe chmod 0644 'fail2ban/action.d/iptables-common.conf.rpmsave' maybe chmod 0640 'fail2ban/action.d/iptables-ipset.conf' -maybe chmod 0644 'fail2ban/action.d/iptables-multiport-log.conf' -maybe chmod 0644 'fail2ban/action.d/iptables-multiport.conf' -maybe chmod 0644 'fail2ban/action.d/iptables-new.conf' -maybe chmod 0644 'fail2ban/action.d/iptables-xt_recent-echo.conf' -maybe chmod 0644 'fail2ban/action.d/iptables.conf' -maybe chmod 0644 'fail2ban/action.d/mail-whois-common.conf' maybe chmod 0644 'fail2ban/action.d/mail.conf.rpmsave' -maybe chmod 0644 'fail2ban/action.d/mynetwatchman.conf' -maybe chmod 0644 'fail2ban/action.d/netscaler.conf' -maybe chmod 0644 'fail2ban/action.d/nftables-allports.conf' -maybe chmod 0644 'fail2ban/action.d/nftables-multiport.conf' -maybe chmod 0644 'fail2ban/action.d/nftables.conf' -maybe chmod 0644 'fail2ban/action.d/nginx-block-map.conf' -maybe chmod 0644 'fail2ban/action.d/npf.conf' -maybe chmod 0644 'fail2ban/action.d/nsupdate.conf' -maybe chmod 0644 'fail2ban/action.d/route.conf' -maybe chmod 0644 'fail2ban/action.d/sendmail-buffered.conf' -maybe chmod 0644 'fail2ban/action.d/sendmail-common.conf' -maybe chmod 0644 'fail2ban/action.d/sendmail-geoip-lines.conf' -maybe chmod 0644 'fail2ban/action.d/sendmail-whois-ipjailmatches.conf' -maybe chmod 0644 'fail2ban/action.d/sendmail-whois-ipmatches.conf' -maybe chmod 0644 'fail2ban/action.d/sendmail-whois-lines.conf' -maybe chmod 0644 'fail2ban/action.d/sendmail-whois-matches.conf' -maybe chmod 0644 'fail2ban/action.d/sendmail-whois.conf' -maybe chmod 0644 'fail2ban/action.d/sendmail.conf' -maybe chmod 0644 'fail2ban/action.d/shorewall-ipset-proto6.conf' -maybe chmod 0644 'fail2ban/action.d/smtp.py' maybe chmod 0644 'fail2ban/action.d/smtp.py.rpmnew' -maybe chmod 0644 'fail2ban/action.d/symbiosis-blacklist-allports.conf' -maybe chmod 0644 'fail2ban/action.d/xarf-login-attack.conf' -maybe chmod 0644 'fail2ban/fail2ban.conf' -maybe chmod 0755 'fail2ban/fail2ban.d' +maybe chmod 0644 'fail2ban/action.d/smtp.py.rpmsave' +maybe chmod 0644 'fail2ban/fail2ban.conf.rpmsave' maybe chmod 0755 'fail2ban/filter.d' -maybe chmod 0644 'fail2ban/filter.d/3proxy.conf' maybe chmod 0640 'fail2ban/filter.d/a.txt' -maybe chmod 0644 'fail2ban/filter.d/apache-auth.conf' -maybe chmod 0644 'fail2ban/filter.d/apache-badbots.conf' -maybe chmod 0644 'fail2ban/filter.d/apache-botsearch.conf' -maybe chmod 0644 'fail2ban/filter.d/apache-common.conf' -maybe chmod 0644 'fail2ban/filter.d/apache-fakegooglebot.conf' -maybe chmod 0644 'fail2ban/filter.d/apache-modsecurity.conf' -maybe chmod 0644 'fail2ban/filter.d/apache-nohome.conf' -maybe chmod 0644 'fail2ban/filter.d/apache-noscript.conf' -maybe chmod 0644 'fail2ban/filter.d/apache-overflows.conf' -maybe chmod 0644 'fail2ban/filter.d/apache-pass.conf' -maybe chmod 0644 'fail2ban/filter.d/apache-shellshock.conf' -maybe chmod 0644 'fail2ban/filter.d/assp.conf' -maybe chmod 0644 'fail2ban/filter.d/asterisk.conf' -maybe chmod 0644 'fail2ban/filter.d/bitwarden.conf' -maybe chmod 0644 'fail2ban/filter.d/botsearch-common.conf' -maybe chmod 0644 'fail2ban/filter.d/centreon.conf' -maybe chmod 0644 'fail2ban/filter.d/common.conf' -maybe chmod 0644 'fail2ban/filter.d/counter-strike.conf' -maybe chmod 0644 'fail2ban/filter.d/courier-auth.conf' -maybe chmod 0644 'fail2ban/filter.d/courier-smtp.conf' -maybe chmod 0644 'fail2ban/filter.d/cyrus-imap.conf' -maybe chmod 0644 'fail2ban/filter.d/directadmin.conf' -maybe chmod 0644 'fail2ban/filter.d/domino-smtp.conf' -maybe chmod 0644 'fail2ban/filter.d/dovecot.conf' maybe chmod 0644 'fail2ban/filter.d/dovecot.conf.rpmnew' -maybe chmod 0644 'fail2ban/filter.d/dropbear.conf' -maybe chmod 0644 'fail2ban/filter.d/drupal-auth.conf' -maybe chmod 0644 'fail2ban/filter.d/ejabberd-auth.conf' -maybe chmod 0644 'fail2ban/filter.d/exim-common.conf' -maybe chmod 0644 'fail2ban/filter.d/exim-spam.conf' -maybe chmod 0644 'fail2ban/filter.d/exim.conf' -maybe chmod 0644 'fail2ban/filter.d/freeswitch.conf' -maybe chmod 0644 'fail2ban/filter.d/froxlor-auth.conf' -maybe chmod 0644 'fail2ban/filter.d/gitlab.conf' -maybe chmod 0644 'fail2ban/filter.d/grafana.conf' -maybe chmod 0644 'fail2ban/filter.d/groupoffice.conf' -maybe chmod 0644 'fail2ban/filter.d/gssftpd.conf' -maybe chmod 0644 'fail2ban/filter.d/guacamole.conf' -maybe chmod 0644 'fail2ban/filter.d/haproxy-http-auth.conf' -maybe chmod 0644 'fail2ban/filter.d/horde.conf' +maybe chmod 0644 'fail2ban/filter.d/dovecot.conf.rpmsave' maybe chmod 0755 'fail2ban/filter.d/ignorecommands' -maybe chmod 0755 'fail2ban/filter.d/ignorecommands/apache-fakegooglebot' -maybe chmod 0644 'fail2ban/filter.d/kerio.conf' -maybe chmod 0644 'fail2ban/filter.d/lighttpd-auth.conf' -maybe chmod 0644 'fail2ban/filter.d/mongodb-auth.conf' -maybe chmod 0644 'fail2ban/filter.d/monit.conf' -maybe chmod 0644 'fail2ban/filter.d/murmur.conf' -maybe chmod 0644 'fail2ban/filter.d/mysqld-auth.conf' -maybe chmod 0644 'fail2ban/filter.d/nagios.conf' -maybe chmod 0644 'fail2ban/filter.d/named-refused.conf' +maybe chmod 0755 'fail2ban/filter.d/ignorecommands/apache-fakegooglebot.rpmsave' maybe chmod 0644 'fail2ban/filter.d/named-refused.conf.rpmnew' -maybe chmod 0644 'fail2ban/filter.d/nginx-botsearch.conf' +maybe chmod 0644 'fail2ban/filter.d/named-refused.conf.rpmsave' +maybe chmod 0644 'fail2ban/filter.d/nginx-botsearch.conf.rpmsave' maybe chmod 0640 'fail2ban/filter.d/nginx-forbidden.conf' -maybe chmod 0644 'fail2ban/filter.d/nginx-http-auth.conf' -maybe chmod 0644 'fail2ban/filter.d/nginx-limit-req.conf' -maybe chmod 0644 'fail2ban/filter.d/nsd.conf' -maybe chmod 0644 'fail2ban/filter.d/openhab.conf' -maybe chmod 0644 'fail2ban/filter.d/openwebmail.conf' -maybe chmod 0644 'fail2ban/filter.d/oracleims.conf' -maybe chmod 0644 'fail2ban/filter.d/pam-generic.conf' -maybe chmod 0644 'fail2ban/filter.d/perdition.conf' -maybe chmod 0644 'fail2ban/filter.d/php-url-fopen.conf' -maybe chmod 0644 'fail2ban/filter.d/phpmyadmin-syslog.conf' -maybe chmod 0644 'fail2ban/filter.d/portsentry.conf' maybe chmod 0640 'fail2ban/filter.d/postfix-auth.conf' maybe chmod 0640 'fail2ban/filter.d/postfix-rbl.conf' maybe chmod 0644 'fail2ban/filter.d/postfix-sasl.conf' maybe chmod 0640 'fail2ban/filter.d/postfix-smtp-reject.conf' maybe chmod 0640 'fail2ban/filter.d/postfix-ssl-error.conf' -maybe chmod 0644 'fail2ban/filter.d/postfix.conf' -maybe chmod 0644 'fail2ban/filter.d/proftpd.conf' -maybe chmod 0644 'fail2ban/filter.d/pure-ftpd.conf' -maybe chmod 0644 'fail2ban/filter.d/qmail.conf' -maybe chmod 0644 'fail2ban/filter.d/recidive.conf' -maybe chmod 0644 'fail2ban/filter.d/roundcube-auth.conf' -maybe chmod 0644 'fail2ban/filter.d/screensharingd.conf' -maybe chmod 0644 'fail2ban/filter.d/selinux-common.conf' -maybe chmod 0644 'fail2ban/filter.d/selinux-ssh.conf' -maybe chmod 0644 'fail2ban/filter.d/sendmail-auth.conf' -maybe chmod 0644 'fail2ban/filter.d/sendmail-reject.conf' -maybe chmod 0644 'fail2ban/filter.d/sieve.conf' -maybe chmod 0644 'fail2ban/filter.d/slapd.conf' -maybe chmod 0644 'fail2ban/filter.d/softethervpn.conf' -maybe chmod 0644 'fail2ban/filter.d/sogo-auth.conf' -maybe chmod 0644 'fail2ban/filter.d/solid-pop3d.conf' -maybe chmod 0644 'fail2ban/filter.d/squid.conf' -maybe chmod 0644 'fail2ban/filter.d/squirrelmail.conf' -maybe chmod 0644 'fail2ban/filter.d/sshd.conf' +maybe chmod 0644 'fail2ban/filter.d/recidive.conf.rpmsave' maybe chmod 0644 'fail2ban/filter.d/sshd.conf.rpmnew' -maybe chmod 0644 'fail2ban/filter.d/stunnel.conf' -maybe chmod 0644 'fail2ban/filter.d/suhosin.conf' -maybe chmod 0644 'fail2ban/filter.d/tine20.conf' -maybe chmod 0644 'fail2ban/filter.d/traefik-auth.conf' -maybe chmod 0644 'fail2ban/filter.d/uwimap-auth.conf' -maybe chmod 0644 'fail2ban/filter.d/vsftpd.conf' -maybe chmod 0644 'fail2ban/filter.d/webmin-auth.conf' -maybe chmod 0644 'fail2ban/filter.d/wuftpd.conf' -maybe chmod 0644 'fail2ban/filter.d/xinetd-fail.conf' -maybe chmod 0644 'fail2ban/filter.d/znc-adminlog.conf' -maybe chmod 0644 'fail2ban/filter.d/zoneminder.conf' -maybe chmod 0644 'fail2ban/jail.conf' +maybe chmod 0644 'fail2ban/filter.d/sshd.conf.rpmsave' +maybe chmod 0644 'fail2ban/jail.conf.rpmsave' maybe chmod 0755 'fail2ban/jail.d' -maybe chmod 0644 'fail2ban/jail.d/00-firewalld.conf' maybe chmod 0640 'fail2ban/jail.d/default.conf' maybe chmod 0644 'fail2ban/jail.d/recidive.conf' maybe chmod 0640 'fail2ban/jail.local' -maybe chmod 0644 'fail2ban/paths-common.conf' -maybe chmod 0644 'fail2ban/paths-fedora.conf' maybe chmod 0644 'filesystems' maybe chmod 0750 'firewalld' -maybe chmod 0644 'firewalld/firewalld.conf' -maybe chmod 0750 'firewalld/helpers' -maybe chmod 0750 'firewalld/icmptypes' -maybe chmod 0750 'firewalld/ipsets' -maybe chmod 0644 'firewalld/lockdown-whitelist.xml' -maybe chmod 0750 'firewalld/policies' -maybe chmod 0750 'firewalld/services' maybe chmod 0750 'firewalld/zones' maybe chmod 0644 'firewalld/zones/public.xml' maybe chmod 0755 'fonts' @@ -2689,8 +2541,7 @@ maybe chmod 0644 'logrotate.d/btmp' maybe chmod 0644 'logrotate.d/chrony' maybe chmod 0644 'logrotate.d/clamav-unofficial-sigs' maybe chmod 0644 'logrotate.d/dnf' -maybe chmod 0644 'logrotate.d/fail2ban' -maybe chmod 0644 'logrotate.d/firewalld' +maybe chmod 0644 'logrotate.d/fail2ban.rpmsave' maybe chmod 0644 'logrotate.d/httpd' maybe chmod 0644 'logrotate.d/iptraf-ng' maybe chmod 0644 'logrotate.d/kvm_stat' @@ -3465,7 +3316,6 @@ maybe chmod 0644 'mock/templates/rocky-8.tpl' maybe chmod 0755 'modprobe.d' maybe chmod 0644 'modprobe.d/blacklist-firewire.conf' maybe chmod 0640 'modprobe.d/cramfs.conf' -maybe chmod 0644 'modprobe.d/firewalld-sysctls.conf' maybe chmod 0644 'modprobe.d/lockd.conf' maybe chmod 0644 'modprobe.d/mlx4.conf' maybe chmod 0644 'modprobe.d/nodccp.conf' @@ -3512,12 +3362,6 @@ maybe chmod 0755 'newrelic-infra/logging.d' maybe chmod 0644 'newrelic-infra/logging.d/postfix.yml' maybe chmod 0644 'nfs.conf' maybe chmod 0644 'nfsmount.conf' -maybe chmod 0700 'nftables' -maybe chmod 0600 'nftables/main.nft' -maybe chmod 0600 'nftables/nat.nft' -maybe chmod 0700 'nftables/osf' -maybe chmod 0600 'nftables/osf/pf.os' -maybe chmod 0600 'nftables/router.nft' maybe chmod 0755 'nginx' maybe chown 'nginx' 'nginx/.anaf' maybe chgrp 'nginx' 'nginx/.anaf' @@ -5119,8 +4963,6 @@ maybe chmod 0644 'sysconfig/chronyd' maybe chmod 0755 'sysconfig/console' maybe chmod 0644 'sysconfig/cpupower' maybe chmod 0644 'sysconfig/crond' -maybe chmod 0600 'sysconfig/ebtables-config' -maybe chmod 0644 'sysconfig/firewalld' maybe chmod 0644 'sysconfig/firstboot' maybe chmod 0644 'sysconfig/garb' maybe chmod 0644 'sysconfig/htcacheclean' @@ -5169,7 +5011,6 @@ maybe chmod 0755 'sysconfig/network-scripts/init.ipv6-global' maybe chmod 0644 'sysconfig/network-scripts/network-functions' maybe chmod 0644 'sysconfig/network-scripts/network-functions-ipv6' maybe chmod 0644 'sysconfig/network-scripts/route-eth0' -maybe chmod 0600 'sysconfig/nftables.conf' maybe chmod 0644 'sysconfig/node_exporter' maybe chmod 0644 'sysconfig/nrpe' maybe chmod 0644 'sysconfig/opendkim' diff --git a/fail2ban/action.d/abuseipdb.conf b/fail2ban/action.d/abuseipdb.conf deleted file mode 100644 index ed958c8..0000000 --- a/fail2ban/action.d/abuseipdb.conf +++ /dev/null @@ -1,104 +0,0 @@ -# Fail2ban configuration file -# -# Action to report IP address to abuseipdb.com -# You must sign up to obtain an API key from abuseipdb.com. -# -# NOTE: These reports may include sensitive Info. -# If you want cleaner reports that ensure no user data see the helper script at the below website. -# -# IMPORTANT: -# -# Reporting an IP of abuse is a serious complaint. Make sure that it is -# serious. Fail2ban developers and network owners recommend you only use this -# action for: -# * The recidive where the IP has been banned multiple times -# * Where maxretry has been set quite high, beyond the normal user typing -# password incorrectly. -# * For filters that have a low likelihood of receiving human errors -# -# This action relies on a api_key being added to the above action conf, -# and the appropriate categories set. -# -# Example, for ssh bruteforce (in section [sshd] of `jail.local`): -# action = %(known/action)s -# abuseipdb[abuseipdb_apikey="my-api-key", abuseipdb_category="18,22"] -# -# See below for categories. -# -# Added to fail2ban by Andrew James Collett (ajcollett) - -## abuseIPDB Categories, `the abuseipdb_category` MUST be set in the jail.conf action call. -# Example, for ssh bruteforce: action = %(action_abuseipdb)s[abuseipdb_category="18,22"] -# ID Title Description -# 3 Fraud Orders -# 4 DDoS Attack -# 9 Open Proxy -# 10 Web Spam -# 11 Email Spam -# 14 Port Scan -# 18 Brute-Force -# 19 Bad Web Bot -# 20 Exploited Host -# 21 Web App Attack -# 22 SSH Secure Shell (SSH) abuse. Use this category in combination with more specific categories. -# 23 IoT Targeted -# See https://abuseipdb.com/categories for more descriptions - -[Definition] - -# bypass action for restored tickets -norestored = 1 - -# Option: actionstart -# Notes.: command executed on demand at the first ban (or at the start of Fail2Ban if actionstart_on_demand is set to false). -# Values: CMD -# -actionstart = - -# Option: actionstop -# Notes.: command executed at the stop of jail (or at the end of Fail2Ban) -# Values: CMD -# -actionstop = - -# Option: actioncheck -# Notes.: command executed once before each actionban command -# Values: CMD -# -actioncheck = - -# Option: actionban -# Notes.: command executed when banning an IP. Take care that the -# command is executed with Fail2Ban user rights. -# -# ** IMPORTANT! ** -# -# By default, this posts directly to AbuseIPDB's API, unfortunately -# this results in a lot of backslashes/escapes appearing in the -# reports. This also may include info like your hostname. -# If you have your own web server with PHP available, you can -# use my (Shaun's) helper PHP script by commenting out the first #actionban -# line below, uncommenting the second one, and pointing the URL at -# wherever you install the helper script. For the PHP helper script, see -# -# -# Tags: See jail.conf(5) man page -# Values: CMD -# -actionban = lgm=$(printf '%%.1000s\n...' ""); curl -sSf "https://api.abuseipdb.com/api/v2/report" -H "Accept: application/json" -H "Key: " --data-urlencode "comment=$lgm" --data-urlencode "ip=" --data "categories=" - -# Option: actionunban -# Notes.: command executed when unbanning an IP. Take care that the -# command is executed with Fail2Ban user rights. -# Tags: See jail.conf(5) man page -# Values: CMD -# -actionunban = - -[Init] -# Option: abuseipdb_apikey -# Notes Your API key from abuseipdb.com -# Values: STRING Default: None -# Register for abuseipdb [https://www.abuseipdb.com], get api key and set below. -# You will need to set the category in the action call. -abuseipdb_apikey = diff --git a/fail2ban/action.d/apf.conf b/fail2ban/action.d/apf.conf deleted file mode 100644 index 5c4a261..0000000 --- a/fail2ban/action.d/apf.conf +++ /dev/null @@ -1,25 +0,0 @@ -# Fail2Ban configuration file -# https://www.rfxn.com/projects/advanced-policy-firewall/ -# -# Note: APF doesn't play nicely with other actions. It has been observed to -# remove bans created by other iptables based actions. If you are going to use -# this action, use it for all of your jails. -# -# DON'T MIX APF and other IPTABLES based actions -[Definition] - -actionstart = -actionstop = -actioncheck = -actionban = apf --deny "banned by Fail2Ban " -actionunban = apf --remove - -[Init] - -# Name used in APF configuration -# -name = default - -# DEV NOTES: -# -# Author: Mark McKinstry diff --git a/fail2ban/action.d/badips.conf b/fail2ban/action.d/badips.conf deleted file mode 100644 index 6f9513f..0000000 --- a/fail2ban/action.d/badips.conf +++ /dev/null @@ -1,19 +0,0 @@ -# Fail2ban reporting to badips.com -# -# Note: This reports an IP only and does not actually ban traffic. Use -# another action in the same jail if you want bans to occur. -# -# Set the category to the appropriate value before use. -# -# To get see register and optional key to get personalised graphs see: -# http://www.badips.com/blog/personalized-statistics-track-the-attackers-of-all-your-servers-with-one-key - -[Definition] - -actionban = curl --fail --user-agent "" http://www.badips.com/add// - -[Init] - -# Option: category -# Notes.: Values are from the list here: http://www.badips.com/get/categories -category = diff --git a/fail2ban/action.d/badips.py b/fail2ban/action.d/badips.py.rpmsave similarity index 100% rename from fail2ban/action.d/badips.py rename to fail2ban/action.d/badips.py.rpmsave diff --git a/fail2ban/action.d/blocklist_de.conf b/fail2ban/action.d/blocklist_de.conf deleted file mode 100644 index ba6d427..0000000 --- a/fail2ban/action.d/blocklist_de.conf +++ /dev/null @@ -1,84 +0,0 @@ -# Fail2Ban configuration file -# -# Author: Steven Hiscocks -# -# - -# Action to report IP address to blocklist.de -# Blocklist.de must be signed up to at www.blocklist.de -# Once registered, one or more servers can be added. -# This action requires the server 'email address' and the associated apikey. -# -# From blocklist.de: -# www.blocklist.de is a free and voluntary service provided by a -# Fraud/Abuse-specialist, whose servers are often attacked on SSH-, -# Mail-Login-, FTP-, Webserver- and other services. -# The mission is to report all attacks to the abuse departments of the -# infected PCs/servers to ensure that the responsible provider can inform -# the customer about the infection and disable them -# -# IMPORTANT: -# -# Reporting an IP of abuse is a serious complaint. Make sure that it is -# serious. Fail2ban developers and network owners recommend you only use this -# action for: -# * The recidive where the IP has been banned multiple times -# * Where maxretry has been set quite high, beyond the normal user typing -# password incorrectly. -# * For filters that have a low likelihood of receiving human errors -# - -[Definition] - -# Option: actionstart -# Notes.: command executed on demand at the first ban (or at the start of Fail2Ban if actionstart_on_demand is set to false). -# Values: CMD -# -actionstart = - -# Option: actionstop -# Notes.: command executed at the stop of jail (or at the end of Fail2Ban) -# Values: CMD -# -actionstop = - -# Option: actioncheck -# Notes.: command executed once before each actionban command -# Values: CMD -# -actioncheck = - -# Option: actionban -# Notes.: command executed when banning an IP. Take care that the -# command is executed with Fail2Ban user rights. -# Tags: See jail.conf(5) man page -# Values: CMD -# -actionban = curl --fail --data-urlencode "server=" --data "apikey=" --data "service=" --data "ip=" --data-urlencode "logs=
" --data 'format=text' --user-agent "" "https://www.blocklist.de/en/httpreports.html" - -# Option: actionunban -# Notes.: command executed when unbanning an IP. Take care that the -# command is executed with Fail2Ban user rights. -# Tags: See jail.conf(5) man page -# Values: CMD -# -actionunban = - -# Option: email -# Notes server email address, as per blocklist.de account -# Values: STRING Default: None -# -#email = - -# Option: apikey -# Notes your user blocklist.de user account apikey -# Values: STRING Default: None -# -#apikey = - -# Option: service -# Notes service name you are reporting on, typically aligns with filter name -# see http://www.blocklist.de/en/httpreports.html for full list -# Values: STRING Default: None -# -#service = diff --git a/fail2ban/action.d/cloudflare.conf b/fail2ban/action.d/cloudflare.conf deleted file mode 100644 index 361cb17..0000000 --- a/fail2ban/action.d/cloudflare.conf +++ /dev/null @@ -1,83 +0,0 @@ -# -# Author: Mike Rushton -# -# IMPORTANT -# -# Please set jail.local's permission to 640 because it contains your CF API key. -# -# This action depends on curl (and optionally jq). -# Referenced from http://www.normyee.net/blog/2012/02/02/adding-cloudflare-support-to-fail2ban by NORM YEE -# -# To get your CloudFlare API Key: https://www.cloudflare.com/a/account/my-account -# -# CloudFlare API error codes: https://www.cloudflare.com/docs/host-api.html#s4.2 - -[Definition] - -# Option: actionstart -# Notes.: command executed on demand at the first ban (or at the start of Fail2Ban if actionstart_on_demand is set to false). -# Values: CMD -# -actionstart = - -# Option: actionstop -# Notes.: command executed at the stop of jail (or at the end of Fail2Ban) -# Values: CMD -# -actionstop = - -# Option: actioncheck -# Notes.: command executed once before each actionban command -# Values: CMD -# -actioncheck = - -# Option: actionban -# Notes.: command executed when banning an IP. Take care that the -# command is executed with Fail2Ban user rights. -# Tags: IP address -# number of failures -#