Difference between revisions of "ASSP"

From Fail2ban
Jump to navigationJump to search
m (There was no action specified in jail.conf)
m
Line 34: Line 34:
 
  port    = smtp,ssmtp
 
  port    = smtp,ssmtp
 
  filter  = assp
 
  filter  = assp
  action = iptables[name=ASSP, port=25, protocol=tcp]
+
  action   = iptables[name=ASSP, port=25, protocol=tcp]
 
             sendmail-whois[name=ASSP, dest=email@domain.com]
 
             sendmail-whois[name=ASSP, dest=email@domain.com]
 
  logpath  = /var/log/assp/maillog.txt
 
  logpath  = /var/log/assp/maillog.txt

Revision as of 02:37, 6 September 2010

ASSP filter for Fail2ban

Create a new configuration file with the contents below: /etc/fail2ban/filter.d/assp.conf

# Fail2Ban configuration file
#
# Author: Viktor Ferenczi (python <at-here> cx <dot-here> hu)
#

[Definition] 

# Option:  failregex
# Notes.:  regex to match the SMTP failure messages in the logfile. The
#          host must be matched by a group named "host". The tag "<HOST>" can
#          be used for standard IP/hostname matching and is only an alias for
#          (?:::f{4,6}:)?(?P<host>\S+)
# Values:  TEXT
#
# Example: Nov-14-09 00:14:50 54090-05322 201.244.255.72 <badguy@gtgwhhrthrth.com> [SMTP Error] 550 5.1.1 User unknown: your.user@your-domain.com
failregex = .*? \d{5}-\d{5} <HOST> <.*?> \[SMTP Error\] (.*) 

# Option:  ignoreregex
# Notes.:  regex to ignore. If this regex matches, the line is ignored.
# Values:  TEXT
#
ignoreregex = 


Add this section to your /etc/fail2ban/jail.conf file:

[assp]

enabled  = true
port     = smtp,ssmtp
filter   = assp
action   = iptables[name=ASSP, port=25, protocol=tcp]
           sendmail-whois[name=ASSP, dest=email@domain.com]
logpath  = /var/log/assp/maillog.txt


IMPORTANT: Symlink the logs subdirectory of your ASSP installation as /var/log/assp or change the logpath in your jail configuration to point to ASSP's maillog.txt file.

Don't forget to restart fail2ban.

Check the end of your fail2ban.log whether fail2ban picked up ASSP's log file.