From 6bbbca9bb98c8a3c37bfc8795048995c673b795a Mon Sep 17 00:00:00 2001 From: Thuban <thuban@yeuxdelibad.net> Date: Mon, 26 Feb 2018 16:38:51 +0000 Subject: [PATCH] example config file installed --- vilain.conf | 23 +++++++++++++++++++++-- 1 files changed, 21 insertions(+), 2 deletions(-) diff --git a/vilain.conf b/vilain.conf index b3d67e2..c12a92e 100644 --- a/vilain.conf +++ b/vilain.conf @@ -17,8 +17,7 @@ ### Ip ignored ### [ignoreip] -ip1 = 92.150.160.157 -ip2 = 92.150.160.156 +ip1 = 127.0.0.1 ### Guardians #[name of the guardian] @@ -49,12 +48,32 @@ [smtp] logfile = /var/log/maillog regex = .* event=failed-command address=([\S]+) .* +maxtries = 2 [dovecot] logfile = /var/log/maillog regex = .*auth failed.*rip=([\S]+),.* +maxtries = 2 [wordpress] # don't use if you have wordpress logfile = /var/www/logs/access.log regex = (?:\S+\s){1}(\S+).*wp-login.php.* +maxtries = 1 + +# Nextcloud: login page +# Nextcloud 12 brings protection against brute-force attacks +# but 1/ not yet tested so far 2/ system protection is probably more efficient +#[nextcloud] +#logfile = /var/www/htdocs/datacloud/nextcloud.log +#regex = .*Bruteforce attempt from \\"(.*)\\" detected + +# Nextcloud: public shares protected by password +# regex is compliant with NginX log format: +# /etc/nginx/nginx.conf: +# log_format main '$remote_addr - $remote_user [$time_local] "$request" ' +# '$status $body_bytes_sent "$http_referer" ' +# '"$http_user_agent" "$http_x_forwarded_for"'; +#[nextcloud-share] +#logfile = /var/www/logs/access-nextcloud.log +#regex = (\d+\.\d+\.\d+\.\d+) \-.*POST /s/\w+/authenticate HTTP/1.1\" 200 -- Gitblit v1.9.3