saving uncommitted changes in /etc prior to dnf run

This commit is contained in:
2022-12-15 13:17:17 +02:00
parent 933e1a68af
commit 8a3dd155de
24 changed files with 406 additions and 204 deletions

View File

@@ -863,8 +863,6 @@ maybe chmod 0644 'fail2ban/filter.d/solid-pop3d.conf'
maybe chmod 0644 'fail2ban/filter.d/squid.conf'
maybe chmod 0644 'fail2ban/filter.d/squirrelmail.conf'
maybe chmod 0640 'fail2ban/filter.d/sshd.conf'
maybe chmod 0644 'fail2ban/filter.d/sshd.conf.rpmnew'
maybe chmod 0640 'fail2ban/filter.d/sshd.conf.rpmsave'
maybe chmod 0644 'fail2ban/filter.d/stunnel.conf'
maybe chmod 0644 'fail2ban/filter.d/suhosin.conf'
maybe chmod 0644 'fail2ban/filter.d/tine20.conf'
@@ -1716,9 +1714,13 @@ maybe chmod 0640 'letsencrypt/archive/sumo.898.ro/privkey8.pem'
maybe chmod 0640 'letsencrypt/archive/sumo.898.ro/privkey9.pem'
maybe chmod 0750 'letsencrypt/archive/trace.898.ro'
maybe chmod 0640 'letsencrypt/archive/trace.898.ro/cert1.pem'
maybe chmod 0640 'letsencrypt/archive/trace.898.ro/cert2.pem'
maybe chmod 0640 'letsencrypt/archive/trace.898.ro/chain1.pem'
maybe chmod 0640 'letsencrypt/archive/trace.898.ro/chain2.pem'
maybe chmod 0640 'letsencrypt/archive/trace.898.ro/fullchain1.pem'
maybe chmod 0640 'letsencrypt/archive/trace.898.ro/fullchain2.pem'
maybe chmod 0600 'letsencrypt/archive/trace.898.ro/privkey1.pem'
maybe chmod 0600 'letsencrypt/archive/trace.898.ro/privkey2.pem'
maybe chmod 0750 'letsencrypt/archive/trtlexplorer.gocrypto.ro'
maybe chmod 0640 'letsencrypt/archive/trtlexplorer.gocrypto.ro/cert1.pem'
maybe chmod 0640 'letsencrypt/archive/trtlexplorer.gocrypto.ro/cert2.pem'
@@ -2352,6 +2354,9 @@ maybe chmod 0640 'letsencrypt/csr/0460_csr-certbot.pem'
maybe chmod 0640 'letsencrypt/csr/0461_csr-certbot.pem'
maybe chmod 0640 'letsencrypt/csr/0462_csr-certbot.pem'
maybe chmod 0640 'letsencrypt/csr/0463_csr-certbot.pem'
maybe chmod 0640 'letsencrypt/csr/0464_csr-certbot.pem'
maybe chmod 0640 'letsencrypt/csr/0465_csr-certbot.pem'
maybe chmod 0640 'letsencrypt/csr/0466_csr-certbot.pem'
maybe chown 'setroubleshoot' 'letsencrypt/keys'
maybe chgrp 'setroubleshoot' 'letsencrypt/keys'
maybe chmod 0700 'letsencrypt/keys'
@@ -2851,6 +2856,9 @@ maybe chmod 0600 'letsencrypt/keys/0460_key-certbot.pem'
maybe chmod 0600 'letsencrypt/keys/0461_key-certbot.pem'
maybe chmod 0600 'letsencrypt/keys/0462_key-certbot.pem'
maybe chmod 0600 'letsencrypt/keys/0463_key-certbot.pem'
maybe chmod 0600 'letsencrypt/keys/0464_key-certbot.pem'
maybe chmod 0600 'letsencrypt/keys/0465_key-certbot.pem'
maybe chmod 0600 'letsencrypt/keys/0466_key-certbot.pem'
maybe chown 'setroubleshoot' 'letsencrypt/live'
maybe chgrp 'setroubleshoot' 'letsencrypt/live'
maybe chmod 0700 'letsencrypt/live'

View File

@@ -14,6 +14,6 @@ _daemon = postfix(-\w+)?/smtpd
failregex = ^%(__prefix_line)sNOQUEUE: reject: RCPT from \S+\[<HOST>\]: 454 4\.7\.1 Service unavailable; Client host \[\S+\] blocked using .* from=<\S*> to=<\S+> proto=ESMTP helo=<\S*>$
ignoreregex =
ignoreregex = closedir$
# Author: Lee Clemens

View File

@@ -1,136 +0,0 @@
# Fail2Ban filter for openssh
#
# If you want to protect OpenSSH from being bruteforced by password
# authentication then get public key authentication working before disabling
# PasswordAuthentication in sshd_config.
#
#
# "Connection from <HOST> port \d+" requires LogLevel VERBOSE in sshd_config
#
[INCLUDES]
# Read common prefixes. If any customizations available -- read them from
# common.local
before = common.conf
[DEFAULT]
_daemon = sshd
# optional prefix (logged from several ssh versions) like "error: ", "error: PAM: " or "fatal: "
__pref = (?:(?:error|fatal): (?:PAM: )?)?
# optional suffix (logged from several ssh versions) like " [preauth]"
#__suff = (?: port \d+)?(?: \[preauth\])?\s*
__suff = (?: (?:port \d+|on \S+|\[preauth\])){0,3}\s*
__on_port_opt = (?: (?:port \d+|on \S+)){0,2}
# close by authenticating user:
__authng_user = (?: (?:invalid|authenticating) user <F-USER>\S+|.*?</F-USER>)?
# for all possible (also future) forms of "no matching (cipher|mac|MAC|compression method|key exchange method|host key type) found",
# see ssherr.c for all possible SSH_ERR_..._ALG_MATCH errors.
__alg_match = (?:(?:\w+ (?!found\b)){0,2}\w+)
# PAM authentication mechanism, can be overridden, e. g. `filter = sshd[__pam_auth='pam_ldap']`:
__pam_auth = pam_[a-z]+
[Definition]
prefregex = ^<F-MLFID>%(__prefix_line)s</F-MLFID>%(__pref)s<F-CONTENT>.+</F-CONTENT>$
cmnfailre = ^[aA]uthentication (?:failure|error|failed) for <F-USER>.*</F-USER> from <HOST>( via \S+)?%(__suff)s$
^User not known to the underlying authentication module for <F-USER>.*</F-USER> from <HOST>%(__suff)s$
<cmnfailre-failed-pub-<publickey>>
^Failed <cmnfailed> for (?P<cond_inv>invalid user )?<F-USER>(?P<cond_user>\S+)|(?(cond_inv)(?:(?! from ).)*?|[^:]+)</F-USER> from <HOST>%(__on_port_opt)s(?: ssh\d*)?(?(cond_user): |(?:(?:(?! from ).)*)$)
^<F-USER>ROOT</F-USER> LOGIN REFUSED FROM <HOST>
^[iI](?:llegal|nvalid) user <F-USER>.*?</F-USER> from <HOST>%(__suff)s$
^User <F-USER>\S+|.*?</F-USER> from <HOST> not allowed because not listed in AllowUsers%(__suff)s$
^User <F-USER>\S+|.*?</F-USER> from <HOST> not allowed because listed in DenyUsers%(__suff)s$
^User <F-USER>\S+|.*?</F-USER> from <HOST> not allowed because not in any group%(__suff)s$
^refused connect from \S+ \(<HOST>\)
^Received <F-MLFFORGET>disconnect</F-MLFFORGET> from <HOST>%(__on_port_opt)s:\s*3: .*: Auth fail%(__suff)s$
^User <F-USER>\S+|.*?</F-USER> from <HOST> not allowed because a group is listed in DenyGroups%(__suff)s$
^User <F-USER>\S+|.*?</F-USER> from <HOST> not allowed because none of user's groups are listed in AllowGroups%(__suff)s$
^<F-NOFAIL>%(__pam_auth)s\(sshd:auth\):\s+authentication failure;</F-NOFAIL>(?:\s+(?:(?:logname|e?uid|tty)=\S*)){0,4}\s+ruser=<F-ALT_USER>\S*</F-ALT_USER>\s+rhost=<HOST>(?:\s+user=<F-USER>\S*</F-USER>)?%(__suff)s$
^maximum authentication attempts exceeded for <F-USER>.*</F-USER> from <HOST>%(__on_port_opt)s(?: ssh\d*)?%(__suff)s$
^User <F-USER>\S+|.*?</F-USER> not allowed because account is locked%(__suff)s
^<F-MLFFORGET>Disconnecting</F-MLFFORGET>(?: from)?(?: (?:invalid|authenticating)) user <F-USER>\S+</F-USER> <HOST>%(__on_port_opt)s:\s*Change of username or service not allowed:\s*.*\[preauth\]\s*$
^Disconnecting: Too many authentication failures(?: for <F-USER>\S+|.*?</F-USER>)?%(__suff)s$
^<F-NOFAIL>Received <F-MLFFORGET>disconnect</F-MLFFORGET></F-NOFAIL> from <HOST>%(__on_port_opt)s:\s*11:
<mdre-<mode>-other>
^<F-MLFFORGET><F-MLFGAINED>Accepted \w+</F-MLFGAINED></F-MLFFORGET> for <F-USER>\S+</F-USER> from <HOST>(?:\s|$)
cmnfailed-any = \S+
cmnfailed-ignore = \b(?!publickey)\S+
cmnfailed-invalid = <cmnfailed-ignore>
cmnfailed-nofail = (?:<F-NOFAIL>publickey</F-NOFAIL>|\S+)
cmnfailed = <cmnfailed-<publickey>>
mdre-normal =
# used to differentiate "connection closed" with and without `[preauth]` (fail/nofail cases in ddos mode)
mdre-normal-other = ^<F-NOFAIL><F-MLFFORGET>(Connection closed|Disconnected)</F-MLFFORGET></F-NOFAIL> (?:by|from)%(__authng_user)s <HOST>(?:%(__suff)s|\s*)$
mdre-ddos = ^Did not receive identification string from <HOST>
^kex_exchange_identification: (?:[Cc]lient sent invalid protocol identifier|[Cc]onnection closed by remote host)
^Bad protocol version identification '.*' from <HOST>
^<F-NOFAIL>SSH: Server;Ltype:</F-NOFAIL> (?:Authname|Version|Kex);Remote: <HOST>-\d+;[A-Z]\w+:
^Read from socket failed: Connection <F-MLFFORGET>reset</F-MLFFORGET> by peer
# same as mdre-normal-other, but as failure (without <F-NOFAIL>) and [preauth] only:
mdre-ddos-other = ^<F-MLFFORGET>(Connection (?:closed|reset)|Disconnected)</F-MLFFORGET> (?:by|from)%(__authng_user)s <HOST>%(__on_port_opt)s\s+\[preauth\]\s*$
mdre-extra = ^Received <F-MLFFORGET>disconnect</F-MLFFORGET> from <HOST>%(__on_port_opt)s:\s*14: No(?: supported)? authentication methods available
^Unable to negotiate with <HOST>%(__on_port_opt)s: no matching <__alg_match> found.
^Unable to negotiate a <__alg_match>
^no matching <__alg_match> found:
# part of mdre-ddos-other, but user name is supplied (invalid/authenticating) on [preauth] phase only:
mdre-extra-other = ^<F-MLFFORGET>Disconnected</F-MLFFORGET>(?: from)?(?: (?:invalid|authenticating)) user <F-USER>\S+|.*?</F-USER> <HOST>%(__on_port_opt)s \[preauth\]\s*$
mdre-aggressive = %(mdre-ddos)s
%(mdre-extra)s
# mdre-extra-other is fully included within mdre-ddos-other:
mdre-aggressive-other = %(mdre-ddos-other)s
# Parameter "publickey": nofail (default), invalid, any, ignore
publickey = nofail
# consider failed publickey for invalid users only:
cmnfailre-failed-pub-invalid = ^Failed publickey for invalid user <F-USER>(?P<cond_user>\S+)|(?:(?! from ).)*?</F-USER> from <HOST>%(__on_port_opt)s(?: ssh\d*)?(?(cond_user): |(?:(?:(?! from ).)*)$)
# consider failed publickey for valid users too (don't need RE, see cmnfailed):
cmnfailre-failed-pub-any =
# same as invalid, but consider failed publickey for valid users too, just as no failure (helper to get IP and user-name only, see cmnfailed):
cmnfailre-failed-pub-nofail = <cmnfailre-failed-pub-invalid>
# don't consider failed publickey as failures (don't need RE, see cmnfailed):
cmnfailre-failed-pub-ignore =
cfooterre = ^<F-NOFAIL>Connection from</F-NOFAIL> <HOST>
failregex = %(cmnfailre)s
<mdre-<mode>>
%(cfooterre)s
# Parameter "mode": normal (default), ddos, extra or aggressive (combines all)
# Usage example (for jail.local):
# [sshd]
# mode = extra
# # or another jail (rewrite filter parameters of jail):
# [sshd-aggressive]
# filter = sshd[mode=aggressive]
#
mode = normal
#filter = sshd[mode=aggressive]
ignoreregex =
maxlines = 1
journalmatch = _SYSTEMD_UNIT=sshd.service + _COMM=sshd
# DEV Notes:
#
# "Failed \S+ for .*? from <HOST>..." failregex uses non-greedy catch-all because
# it is coming before use of <HOST> which is not hard-anchored at the end as well,
# and later catch-all's could contain user-provided input, which need to be greedily
# matched away first.
#
# Author: Cyril Jaquier, Yaroslav Halchenko, Petr Voralek, Daniel Black and Sergey Brester aka sebres
# Rewritten using prefregex (and introduced "mode" parameter) by Serg G. Brester.

View File

@@ -1,55 +0,0 @@
# Fail2Ban filter for openssh
#
# If you want to protect OpenSSH from being bruteforced by password
# authentication then get public key authentication working before disabling
# PasswordAuthentication in sshd_config.
#
#
# "Connection from <HOST> port \d+" requires LogLevel VERBOSE in sshd_config
#
[INCLUDES]
# Read common prefixes. If any customizations available -- read them from
# common.local
before = common.conf
[Definition]
_daemon = sshd
failregex = ^%(__prefix_line)s(?:error: PAM: )?[aA]uthentication (?:failure|error|failed) for .* from <HOST>( via \S+)?\s*$
^%(__prefix_line)s(?:error: PAM: )?User not known to the underlying authentication module for .* from <HOST>\s*$
^%(__prefix_line)sFailed \S+ for (?P<cond_inv>invalid user )?(?P<user>(?P<cond_user>\S+)|(?(cond_inv)(?:(?! from ).)*?|[^:]+)) from <HOST>(?: port \d+)?(?: ssh\d*)?(?(cond_user):|(?:(?:(?! from ).)*)$)
^%(__prefix_line)sROOT LOGIN REFUSED.* FROM <HOST>\s*$
^%(__prefix_line)s[iI](?:llegal|nvalid) user .*? from <HOST>(?: port \d+)?\s*$
^%(__prefix_line)sUser .+ from <HOST> not allowed because not listed in AllowUsers\s*$
^%(__prefix_line)sUser .+ from <HOST> not allowed because listed in DenyUsers\s*$
^%(__prefix_line)sUser .+ from <HOST> not allowed because not in any group\s*$
^%(__prefix_line)srefused connect from \S+ \(<HOST>\)\s*$
^%(__prefix_line)s(?:error: )?Received disconnect from <HOST>: 3: .*: Auth fail(?: \[preauth\])?$
^%(__prefix_line)sUser .+ from <HOST> not allowed because a group is listed in DenyGroups\s*$
^%(__prefix_line)sUser .+ from <HOST> not allowed because none of user's groups are listed in AllowGroups\s*$
^(?P<__prefix>%(__prefix_line)s)User .+ not allowed because account is locked<SKIPLINES>(?P=__prefix)(?:error: )?Received disconnect from <HOST>: 11: .+ \[preauth\]$
^(?P<__prefix>%(__prefix_line)s)Disconnecting: Too many authentication failures for .+? \[preauth\]<SKIPLINES>(?P=__prefix)(?:error: )?Connection closed by <HOST> \[preauth\]$
^(?P<__prefix>%(__prefix_line)s)Connection from <HOST> port \d+(?: on \S+ port \d+)?<SKIPLINES>(?P=__prefix)Disconnecting: Too many authentication failures for .+? \[preauth\]$
^%(__prefix_line)s(error: )?maximum authentication attempts exceeded for .* from <HOST>(?: port \d*)?(?: ssh\d*)? \[preauth\]$
^%(__prefix_line)spam_unix\(sshd:auth\):\s+authentication failure;\s*logname=\S*\s*uid=\d*\s*euid=\d*\s*tty=\S*\s*ruser=\S*\s*rhost=<HOST>\s.*$
ignoreregex =
[Init]
# "maxlines" is number of log lines to buffer for multi-line regex searches
maxlines = 10
journalmatch = _SYSTEMD_UNIT=sshd.service + _COMM=sshd
# DEV Notes:
#
# "Failed \S+ for .*? from <HOST>..." failregex uses non-greedy catch-all because
# it is coming before use of <HOST> which is not hard-anchored at the end as well,
# and later catch-all's could contain user-provided input, which need to be greedily
# matched away first.
#
# Author: Cyril Jaquier, Yaroslav Halchenko, Petr Voralek, Daniel Black

View File

@@ -32,7 +32,7 @@ enabled = true
[postfix-ssl-error]
enabled = true
[ssh]
[sshd]
enabled = true
[named-tcp]
@@ -44,7 +44,7 @@ enabled = false
[vsftpd]
enabled = true
[ngx-botsearch]
[nginx-botsearch]
enabled = true
[php-url-fopen]

View File

@@ -0,0 +1,30 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@@ -0,0 +1,61 @@
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

View File

@@ -0,0 +1,91 @@
-----BEGIN CERTIFICATE-----
MIIFHTCCBAWgAwIBAgISAx6p+mE70JCouqtJIgDO3MhCMA0GCSqGSIb3DQEBCwUA
MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD
EwJSMzAeFw0yMjEyMTAxNDQ4MDVaFw0yMzAzMTAxNDQ4MDRaMBcxFTATBgNVBAMT
DHRyYWNlLjg5OC5ybzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALa4
eLNIJ/JDmXBRsnU2wu63tEiICc3pHnJnPoT5dGkXDTF5aiE0Ht98jQuGK0OBkb59
Es31sPMxCWOksrBBbIfFGKmBBbVBdhJr+CmPjgbZOnfMlmyR19kZBSNLxhke/KfG
mZ8R2NDFpPxUK3A5xuW1/cxsvbWG+7VpvFInwNPebvH7Im7mmp6V0ZOPB9Fsc1hZ
jXDLpAJKpoGkt4jfGJ2Jsx/nNlz4SVMtH4QzkmYESdcJt/iwyIONt51XAJXAG76o
vQ7yw5r5GwCd9KwW2Gml9tRSLkpiOO7x8aOWsgeAmKvrvsMhRjJEMmWCgPy3PXPV
010dm2aqAuAsv9LsTrUCAwEAAaOCAkYwggJCMA4GA1UdDwEB/wQEAwIFoDAdBgNV
HSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4E
FgQUWzg7AOYf2Oqt/yWJ0iaapKpNHs8wHwYDVR0jBBgwFoAUFC6zF7dYVsuuUAlA
5h+vnYsUwsYwVQYIKwYBBQUHAQEESTBHMCEGCCsGAQUFBzABhhVodHRwOi8vcjMu
by5sZW5jci5vcmcwIgYIKwYBBQUHMAKGFmh0dHA6Ly9yMy5pLmxlbmNyLm9yZy8w
FwYDVR0RBBAwDoIMdHJhY2UuODk4LnJvMEwGA1UdIARFMEMwCAYGZ4EMAQIBMDcG
CysGAQQBgt8TAQEBMCgwJgYIKwYBBQUHAgEWGmh0dHA6Ly9jcHMubGV0c2VuY3J5
cHQub3JnMIIBAwYKKwYBBAHWeQIEAgSB9ASB8QDvAHUAtz77JN+cTbp18jnFulj0
bF38Qs96nzXEnh0JgSXttJkAAAGE/LjhrgAABAMARjBEAiArAYrz29K8VyxWK6Kt
bCDYVtzteDGbrsdXdAlnu7bsJwIgYqJT06WAnuWj8XcHMNKrFYfdg02pDD9Oowu2
flGZpjYAdgCt9776fP8QyIudPZwePhhqtGcpXc+xDCTKhYY069yCigAAAYT8uOPQ
AAAEAwBHMEUCIEZWjpllV1rEiYm3JLonKb7gUNWbwgCzqEbvk4RHtPzpAiEA4GtD
DBefW90f9kHNgPN0Ns2CMBjuqN7RNxbahOUySl4wDQYJKoZIhvcNAQELBQADggEB
AGPCuk8WCdQ8cQsTktWvraWJ7jy4buiE9EkTDgg37ji92MxQPalitU9o9eeOIdZn
YT8zRLPGaQvksFZ+4kGtZXqcoZmS0dbYsmKGGgDyezRwF4DZGWnE7iHo364a2I23
Pa9HstBJ4UVkKOkfV/BVPLqstB/Js4npeFS1A0d24w2LbLxPSGtSW5kEpFfk2SFO
AbQhPFUF0AmU48RIz/EqokWqIO0pzVfH/t8JGrVXMQvhcVtmGo/6+pXhFLV4/Eu3
EbCs7Nr9fWMMWvpZh/dc2XqopXNN5AI3FPTSsNAKxT033PgyrjgQQYcww+KW5AN0
rFpIJOKxGOUCR+sX6uzFfn8=
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
MIIFFjCCAv6gAwIBAgIRAJErCErPDBinU/bWLiWnX1owDQYJKoZIhvcNAQELBQAw
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjAwOTA0MDAwMDAw
WhcNMjUwOTE1MTYwMDAwWjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg
RW5jcnlwdDELMAkGA1UEAxMCUjMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
AoIBAQC7AhUozPaglNMPEuyNVZLD+ILxmaZ6QoinXSaqtSu5xUyxr45r+XXIo9cP
R5QUVTVXjJ6oojkZ9YI8QqlObvU7wy7bjcCwXPNZOOftz2nwWgsbvsCUJCWH+jdx
sxPnHKzhm+/b5DtFUkWWqcFTzjTIUu61ru2P3mBw4qVUq7ZtDpelQDRrK9O8Zutm
NHz6a4uPVymZ+DAXXbpyb/uBxa3Shlg9F8fnCbvxK/eG3MHacV3URuPMrSXBiLxg
Z3Vms/EY96Jc5lP/Ooi2R6X/ExjqmAl3P51T+c8B5fWmcBcUr2Ok/5mzk53cU6cG
/kiFHaFpriV1uxPMUgP17VGhi9sVAgMBAAGjggEIMIIBBDAOBgNVHQ8BAf8EBAMC
AYYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMBMBIGA1UdEwEB/wQIMAYB
Af8CAQAwHQYDVR0OBBYEFBQusxe3WFbLrlAJQOYfr52LFMLGMB8GA1UdIwQYMBaA
FHm0WeZ7tuXkAXOACIjIGlj26ZtuMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcw
AoYWaHR0cDovL3gxLmkubGVuY3Iub3JnLzAnBgNVHR8EIDAeMBygGqAYhhZodHRw
Oi8veDEuYy5sZW5jci5vcmcvMCIGA1UdIAQbMBkwCAYGZ4EMAQIBMA0GCysGAQQB
gt8TAQEBMA0GCSqGSIb3DQEBCwUAA4ICAQCFyk5HPqP3hUSFvNVneLKYY611TR6W
PTNlclQtgaDqw+34IL9fzLdwALduO/ZelN7kIJ+m74uyA+eitRY8kc607TkC53wl
ikfmZW4/RvTZ8M6UK+5UzhK8jCdLuMGYL6KvzXGRSgi3yLgjewQtCPkIVz6D2QQz
CkcheAmCJ8MqyJu5zlzyZMjAvnnAT45tRAxekrsu94sQ4egdRCnbWSDtY7kh+BIm
lJNXoB1lBMEKIq4QDUOXoRgffuDghje1WrG9ML+Hbisq/yFOGwXD9RiX8F6sw6W4
avAuvDszue5L3sz85K+EC4Y/wFVDNvZo4TYXao6Z0f+lQKc0t8DQYzk1OXVu8rp2
yJMC6alLbBfODALZvYH7n7do1AZls4I9d1P4jnkDrQoxB3UqQ9hVl3LEKQ73xF1O
yK5GhDDX8oVfGKF5u+decIsH4YaTw7mP3GFxJSqv3+0lUFJoi5Lc5da149p90Ids
hCExroL1+7mryIkXPeFM5TgO9r0rvZaBFOvV2z0gp35Z0+L4WPlbuEjN/lxPFin+
HlUjr8gRsI3qfJOQFy/9rKIJR0Y/8Omwt/8oTWgy1mdeHmmjk7j1nYsvC9JSQ6Zv
MldlTTKB3zhThV1+XWYp6rjd5JW1zbVWEkLNxE7GJThEUG3szgBVGP7pSWTUTsqX
nLRbwHOoq7hHwg==
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
MIIFYDCCBEigAwIBAgIQQAF3ITfU6UK47naqPGQKtzANBgkqhkiG9w0BAQsFADA/
MSQwIgYDVQQKExtEaWdpdGFsIFNpZ25hdHVyZSBUcnVzdCBDby4xFzAVBgNVBAMT
DkRTVCBSb290IENBIFgzMB4XDTIxMDEyMDE5MTQwM1oXDTI0MDkzMDE4MTQwM1ow
TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh
cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwggIiMA0GCSqGSIb3DQEB
AQUAA4ICDwAwggIKAoICAQCt6CRz9BQ385ueK1coHIe+3LffOJCMbjzmV6B493XC
ov71am72AE8o295ohmxEk7axY/0UEmu/H9LqMZshftEzPLpI9d1537O4/xLxIZpL
wYqGcWlKZmZsj348cL+tKSIG8+TA5oCu4kuPt5l+lAOf00eXfJlII1PoOK5PCm+D
LtFJV4yAdLbaL9A4jXsDcCEbdfIwPPqPrt3aY6vrFk/CjhFLfs8L6P+1dy70sntK
4EwSJQxwjQMpoOFTJOwT2e4ZvxCzSow/iaNhUd6shweU9GNx7C7ib1uYgeGJXDR5
bHbvO5BieebbpJovJsXQEOEO3tkQjhb7t/eo98flAgeYjzYIlefiN5YNNnWe+w5y
sR2bvAP5SQXYgd0FtCrWQemsAXaVCg/Y39W9Eh81LygXbNKYwagJZHduRze6zqxZ
Xmidf3LWicUGQSk+WT7dJvUkyRGnWqNMQB9GoZm1pzpRboY7nn1ypxIFeFntPlF4
FQsDj43QLwWyPntKHEtzBRL8xurgUBN8Q5N0s8p0544fAQjQMNRbcTa0B7rBMDBc
SLeCO5imfWCKoqMpgsy6vYMEG6KDA0Gh1gXxG8K28Kh8hjtGqEgqiNx2mna/H2ql
PRmP6zjzZN7IKw0KKP/32+IVQtQi0Cdd4Xn+GOdwiK1O5tmLOsbdJ1Fu/7xk9TND
TwIDAQABo4IBRjCCAUIwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYw
SwYIKwYBBQUHAQEEPzA9MDsGCCsGAQUFBzAChi9odHRwOi8vYXBwcy5pZGVudHJ1
c3QuY29tL3Jvb3RzL2RzdHJvb3RjYXgzLnA3YzAfBgNVHSMEGDAWgBTEp7Gkeyxx
+tvhS5B1/8QVYIWJEDBUBgNVHSAETTBLMAgGBmeBDAECATA/BgsrBgEEAYLfEwEB
ATAwMC4GCCsGAQUFBwIBFiJodHRwOi8vY3BzLnJvb3QteDEubGV0c2VuY3J5cHQu
b3JnMDwGA1UdHwQ1MDMwMaAvoC2GK2h0dHA6Ly9jcmwuaWRlbnRydXN0LmNvbS9E
U1RST09UQ0FYM0NSTC5jcmwwHQYDVR0OBBYEFHm0WeZ7tuXkAXOACIjIGlj26Ztu
MA0GCSqGSIb3DQEBCwUAA4IBAQAKcwBslm7/DlLQrt2M51oGrS+o44+/yQoDFVDC
5WxCu2+b9LRPwkSICHXM6webFGJueN7sJ7o5XPWioW5WlHAQU7G75K/QosMrAdSW
9MUgNTP52GE24HGNtLi1qoJFlcDyqSMo59ahy2cI2qBDLKobkx/J3vWraV0T9VuG
WCLKTVXkcGdtwlfFRjlBz4pYg1htmf5X6DYO8A4jqv2Il9DjXA6USbW1FzXSLr9O
he8Y4IWS6wY7bCkjCWDcRQJMEhg76fsO3txE+FiYruq9RUWhiF1myv4Q6W+CyBFC
Dfvp7OOGAN6dEOM4+qR9sdjoSYKEBpsr6GtPAQw4dy753ec5
-----END CERTIFICATE-----

View File

@@ -0,0 +1,28 @@
-----BEGIN PRIVATE KEY-----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-----END PRIVATE KEY-----

View File

@@ -0,0 +1,16 @@
-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----

View File

@@ -0,0 +1,16 @@
-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----

View File

@@ -0,0 +1,16 @@
-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----

View File

@@ -0,0 +1,28 @@
-----BEGIN PRIVATE KEY-----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-----END PRIVATE KEY-----

View File

@@ -0,0 +1,28 @@
-----BEGIN PRIVATE KEY-----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-----END PRIVATE KEY-----

View File

@@ -0,0 +1,28 @@
-----BEGIN PRIVATE KEY-----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-----END PRIVATE KEY-----

View File

@@ -1 +1 @@
../../archive/trace.898.ro/cert1.pem
../../archive/trace.898.ro/cert2.pem

View File

@@ -1 +1 @@
../../archive/trace.898.ro/chain1.pem
../../archive/trace.898.ro/chain2.pem

View File

@@ -1 +1 @@
../../archive/trace.898.ro/fullchain1.pem
../../archive/trace.898.ro/fullchain2.pem

View File

@@ -1 +1 @@
../../archive/trace.898.ro/privkey1.pem
../../archive/trace.898.ro/privkey2.pem

View File

@@ -10,3 +10,19 @@
/usr/bin/systemctl reload named-pkcs11.service > /dev/null 2>&1 || true
endscript
}
/var/named/data/*.log {
missingok
su named named
create 0644 named named
daily
rotate 30
datext
nocompress
notifempty
sharedscripts
postrotate
/bin/systemctl reload named.service > /dev/null 2>&1 || true
endscript
}

View File

@@ -1,5 +1,13 @@
geo $allowed_clients {
#geo $allowed_clients {
# default 0;
# 192.168.1.0/24 1;
# 188.26.227.57/32 1;
#}
map $remote_addr $allowed_clients {
default 0;
127.0.0.1 1;
192.168.1.0/24 1;
188.26.227.57/32 1;
188.26.227.57 1;
}

View File

@@ -5,7 +5,7 @@ server {
root /var/www/html/vhosts/club3d.ro/;
index index.php index.html index.htm;
access_log /var/log/nginx/club3d.ro.access.log;
access_log /var/log/nginx/club3d.ro.access.log main;
error_log /var/log/nginx/club3d.ro.error.log;
location ~* \.php$ {

View File

@@ -6,7 +6,7 @@ server {
server_name maintenance.898.ro;
root /var/www/html/maintenance;
access_log /var/log/nginx/maintenance.access.log;
access_log /var/log/nginx/maintenance.access.log main;
error_log /var/log/nginx/maintenance.error.log notice;
# maintenance error page

View File

@@ -22,6 +22,25 @@ http {
include /etc/nginx/mime.types;
default_type application/octet-stream;
log_format main '$remote_addr - $remote_user [$time_local] "$request" '
'$status $body_bytes_sent "$http_referer" '
'"$http_user_agent" "$http_x_forwarded_for"';
#log_format json escape=json '{"source": "nginx", "time": $msec, "resp_body_size": $body_bytes_sent, "host": "$http_host", "address": "$remote_addr", "request_length": $request_length, "method": "$request_method", "uri": "$request_uri", "status": $status, "user_agent": "$http_user_agent", "resp_time": $request_time, "upstream_addr": "$upstream_addr"}';
# log_format json escape=json '{"remote_addr": "$http_x_forwarded_for", '
# '"host": "$host", '
# '"remote_user": "$remote_user", '
# '"time": "$time_local", '
# '"request": "$request", '
# '"status": "$status", '
# '"body_bytes_sent": "$body_bytes_sent",'
# '"http_referer": "$http_referer",'
# '"http_user_agent": "$http_user_agent",'
# '"upstrm": "$upstream_response_time",'
# '"took": "$request_time",'
# '"upstream_addr": "$upstream_addr"}';
#
#log_format json escape=json '{ "timestamp": "$time_iso8601", '
#'"remote_addr": "$remote_addr", '
#'"remote_user": "$remote_user", '