-
Notifications
You must be signed in to change notification settings - Fork 4
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
1.1.0, with verified WordPress 5.7 compatibility
- Loading branch information
Showing
8 changed files
with
2,426 additions
and
332 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,23 +2,37 @@ | |
before = common.conf | ||
after = fail2wp.local | ||
|
||
# This filter is intended to be used with fail2ban and the Fail2WP plugin. | ||
# This filter is intended to be used with Fail2ban and the Fail2WP plugin. | ||
# | ||
# This file should be placed in /etc/fail2ban/filter.d as fail2wp.conf | ||
# | ||
# I'm by no means a fail2ban filter expert, so I'm sure this could do with some | ||
# improvements. It has been tested with fail2ban 0.11.1 on Ubuntu 20.04.LTS. | ||
# improvements. It has been tested with Fail2ban 0.11.1 on Ubuntu 20.04.LTS. | ||
# | ||
# ADVANCED: You may, of course, split these into several different jails and | ||
# triggers and give them different treatment in Fail2ban so that some | ||
# of the log messages trigger one behavior in Fail2ban, and others | ||
# are ignored or behave differently. | ||
# | ||
# Joaquim Homrighausen <[email protected]> | ||
# | ||
# The intended log messages to trigger fail2ban on are: | ||
# | ||
# @since 1.0.0 | ||
# | ||
# Authentication failure for validuser from n.n.n.n port 443 | ||
# Invalid email invalidemail from n.n.n.n port 443 | ||
# Invalid user invaliduser from n.n.n.n port 443 | ||
# User enumeration request from n.n.n.n port 443 | ||
# Invalid credentials invalidlogin from n.n.n.n port 443 | ||
# | ||
# @since 1.1.0 | ||
# | ||
# Blocked REST API request from n.n.n.n port 443 | ||
# Unauthenticated REST API request from n.n.n.n port 443 | ||
# | ||
# Other messages: | ||
# | ||
# The Fail2WP plugin can further emit these messages (no action taken): | ||
# | ||
# Unknown error "nnn" during login from n.n.n.n port nnn | ||
|
@@ -31,7 +45,8 @@ failregex = fail2wp(.*): Authentication failure for .* from <HOST> port .*$ | |
fail2wp(.*): Invalid user .* from <HOST> port .*$ | ||
fail2wp(.*): Invalid email .* from <HOST> port .*$ | ||
fail2wp(.*): Invalid credentials .* from <HOST> port .*$ | ||
fail2wp(.*): User enumeration request from <HOST> port .*$ | ||
fail2wp(.*): Blocked REST API request from from <HOST> port .*$ | ||
fail2wp(.*): Unauthenticated REST API request from <HOST> port .*$ | ||
|
||
# Your entry for Fail2WP in jail.local should look like this: | ||
# | ||
|
Oops, something went wrong.