From 9139472a675a61e7f00c93bb9f888da095ea854e Mon Sep 17 00:00:00 2001 From: Yax <kianby@madyanne.fr> Date: Sat, 16 Sep 2017 10:36:30 +0000 Subject: [PATCH] add nextcloud probes --- vilain.conf | 21 ++++++++++++++++++++- 1 files changed, 20 insertions(+), 1 deletions(-) diff --git a/vilain.conf b/vilain.conf index ecfec45..907460e 100644 --- a/vilain.conf +++ b/vilain.conf @@ -1,13 +1,16 @@ [DEFAULT] # 24h + 5min # Time to keep banned a bad ip -watch_while = 86700 +watch_while = 86700 # Max tries before being banned maxtries = 3 # pf table to keep bad IP. # remember to clean the table with this command in a cron job : # /sbin/pfctl -t vilain_bruteforce -T expire 86400 vilain_table = vilain_bruteforce + +# vilain log file +vilain_log = /var/log/daemon # duration before each checks on the different log files sleeptime = 3.0 @@ -56,3 +59,19 @@ logfile = /var/www/logs/access.log regex = (?:\S+\s){1}(\S+).*wp-login.php.* +# Nextcloud: login page +# Nextcloud 12 brings protection against brute-force attacks +# but 1/ not yet tested so far 2/ system protection is probably more efficient +[nextcloud] +logfile = /var/www/htdocs/datacloud/nextcloud.log +regex = .*Bruteforce attempt from \\"(.*)\\" detected + +# Nextcloud: public shares protected by password +# regex is compliant with NginX log format: +# /etc/nginx/nginx.conf: +# log_format main '$remote_addr - $remote_user [$time_local] "$request" ' +# '$status $body_bytes_sent "$http_referer" ' +# '"$http_user_agent" "$http_x_forwarded_for"'; +[nextcloud-share] +logfile = /var/www/logs/access-nextcloud.log +regex = (\d+\.\d+\.\d+\.\d+) \-.*POST /s/\w+/authenticate HTTP/1.1\" 200 -- Gitblit v1.9.3