Server IP : 195.201.23.43 / Your IP : 3.144.147.211 Web Server : Apache System : Linux webserver2.vercom.be 5.4.0-192-generic #212-Ubuntu SMP Fri Jul 5 09:47:39 UTC 2024 x86_64 User : kdecoratie ( 1041) PHP Version : 7.1.33-63+ubuntu20.04.1+deb.sury.org+1 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals, MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /etc/fail2ban/filter.d/ |
Upload File : |
# Fail2Ban filters for qmail RBL patches/fake proxies # # the default djb RBL implementation doesn't log any rejections # so is useless with this filter. # # One patch is here: # # http://www.tjsi.com/rblsmtpd/faq/ patch to rblsmtpd [INCLUDES] before = common.conf [Definition] _daemon = (?:qmail|rblsmtpd) failregex = ^%(__prefix_line)s\d+\.\d+ rblsmtpd: <HOST> pid \d+ \S+ 4\d\d \S+\s*$ ^%(__prefix_line)s\d+\.\d+ qmail-smtpd: 4\d\d badiprbl: ip <HOST> rbl: \S+\s*$ ^%(__prefix_line)s\S+ blocked <HOST> \S+ -\s*$ ignoreregex = # DEV Notes: # # These seem to be for two or 3 different patches to qmail or rblsmtpd # so you'll probably only ever see one of these regex's that match. # # ref: https://github.com/fail2ban/fail2ban/pull/386 # # Author: Daniel BlackPrivate