On 7/13/21 12:34 AM, Tom Hendrikx wrote:
> Please post full configuration if you're not sure what to look for. I
> have no idea what 'suricata' is though
>
Suricata is an Intrusion Detection/Prevention Software.
----[ jail ]----
[suricata-1]
enabled = true
logpath = /data01/var/log/suricata/fast.log
datepattern = %%m/%%d/%%Y-%%H:%%M:%%S
#
bantime = 12w
maxretry = 1
findtime = 3w
action = iptables[name=sri-1, port="53", protocol=udp]
----[ end ]----
----[ filter ]----
[Definition]
__suricata-1_actions = (?:dropping|refusing)
#
Sample
# 08/01/2020-09:50:43.513215 [Drop] [**] [1:2030555:1] ET INFO Outbound RRSIG
DNS Query Observed [**] [Classification: Potentially Bad Traffic] [Priority: 2]
{UDP} 192.168.69.246:53 -> 72.196.10.7:30903
# 10/05/2020-09:27:35.208728 [Drop] [**] [1:2009702:5] ET POLICY DNS Update
>From External net [**] [Classification: Potential Corporate Privacy Violation]
[Priority: 1] {UDP} 2.57.122.98:42312 -> 192.168.69.246:53
#
failregex = ^.*\[1\:2016016\:.*\].*? \{UDP\} <HOST>\:.*?
^.*\[1\:2101616\:.*\].*? \{UDP\} <HOST>\:.*?
^.*\[1\:2009702\:.*\].*? \{UDP\} <HOST>\:.*?
^.*\[1\:2030555\:.*\].*? \{UDP\}.*\-\> <HOST>\:.*?
ignoreregex =
datepattern = %%m/%%d/%%Y-%%H:%%M:%%S
----[ end ]----
--
James Moe
moe dot james at sohnen-moe dot com
520.743.3936
Think.
_______________________________________________
Fail2ban-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/fail2ban-users