From 19cf115fce3293d3cd011257760b95c74ea3f362 Mon Sep 17 00:00:00 2001
From: Jenkins Server
Date: Sun, 6 Aug 2017 17:07:25 +0200
Subject: [PATCH] recommit for updates in build 21
---
CHANGELOG.md | 20 ++
doc/_index.html | 2 +-
doc/file.README.html | 2 +-
doc/index.html | 2 +-
doc/puppet_classes/cd_fail2ban.html | 2 +-
.../cd_fail2ban_3A_3Amain_3A_3Aconfig.html | 2 +-
.../cd_fail2ban_3A_3Amain_3A_3Adirs.html | 2 +-
.../cd_fail2ban_3A_3Amain_3A_3Afiles.html | 2 +-
.../cd_fail2ban_3A_3Amain_3A_3Ainstall.html | 2 +-
.../cd_fail2ban_3A_3Amain_3A_3Aservice.html | 2 +-
.../cd_fail2ban_3A_3Aparams.html | 338 +++++++++++++++---
doc/top-level-namespace.html | 2 +-
12 files changed, 317 insertions(+), 61 deletions(-)
diff --git a/CHANGELOG.md b/CHANGELOG.md
index 192962c..399a14e 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -8,6 +8,26 @@ Changelog of Git Changelog.
No issue
+df59c3e85d59b32 Arne Teuke 2017-08-03 16:33:22
+
+
added more file controls
+
+
+1b33e2a2105237c Jenkins Server 2017-08-03 16:32:58
+
+
recommit for updates in build 12
+
+
+d33c85b30d815d8 Arne Teuke 2017-08-03 16:29:36
+
+
added more file controls
+
+
+e4cfd9c5663c0e2 Arne Teuke 2017-08-03 16:25:10
+
+
added more file controls
+
+
cb4b482e20b2be5 Arne Teuke 2017-08-03 14:56:00
fixed controls for main conf/local files
diff --git a/doc/_index.html b/doc/_index.html
index a84ecc4..7d7f332 100644
--- a/doc/_index.html
+++ b/doc/_index.html
@@ -132,7 +132,7 @@
diff --git a/doc/file.README.html b/doc/file.README.html
index 026d4df..88f8336 100644
--- a/doc/file.README.html
+++ b/doc/file.README.html
@@ -251,7 +251,7 @@ environments.
diff --git a/doc/index.html b/doc/index.html
index c844152..38cd58d 100644
--- a/doc/index.html
+++ b/doc/index.html
@@ -251,7 +251,7 @@ environments.
diff --git a/doc/puppet_classes/cd_fail2ban.html b/doc/puppet_classes/cd_fail2ban.html
index 98cca7e..c09a4e7 100644
--- a/doc/puppet_classes/cd_fail2ban.html
+++ b/doc/puppet_classes/cd_fail2ban.html
@@ -139,7 +139,7 @@ class cd_fail2ban {
diff --git a/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Aconfig.html b/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Aconfig.html
index e0aa07f..65525c6 100644
--- a/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Aconfig.html
+++ b/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Aconfig.html
@@ -153,7 +153,7 @@ class cd_fail2ban::main::config (
diff --git a/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Adirs.html b/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Adirs.html
index 2d811b7..8066fa6 100644
--- a/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Adirs.html
+++ b/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Adirs.html
@@ -350,7 +350,7 @@ class cd_fail2ban::main::dirs (
diff --git a/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Afiles.html b/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Afiles.html
index 97bae40..1c4a982 100644
--- a/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Afiles.html
+++ b/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Afiles.html
@@ -286,7 +286,7 @@ class cd_fail2ban::main::files (
diff --git a/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Ainstall.html b/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Ainstall.html
index f22bf7c..a3c4a1e 100644
--- a/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Ainstall.html
+++ b/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Ainstall.html
@@ -159,7 +159,7 @@ class cd_fail2ban::main::install (
diff --git a/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Aservice.html b/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Aservice.html
index dae961d..a3ec0af 100644
--- a/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Aservice.html
+++ b/doc/puppet_classes/cd_fail2ban_3A_3Amain_3A_3Aservice.html
@@ -166,7 +166,7 @@ class cd_fail2ban::main::service (
diff --git a/doc/puppet_classes/cd_fail2ban_3A_3Aparams.html b/doc/puppet_classes/cd_fail2ban_3A_3Aparams.html
index 58144fa..f266486 100644
--- a/doc/puppet_classes/cd_fail2ban_3A_3Aparams.html
+++ b/doc/puppet_classes/cd_fail2ban_3A_3Aparams.html
@@ -128,7 +128,9 @@ for more details.
with this program. If not, see www.gnu.org/licenses/.
CRITICAL,ERROR,WARNING,NOTICE,INFO
-and DEBUG.
+and DEBUG.
+ @param [string] Report ban via badips.com, and use
+as blacklist
@@ -537,10 +539,10 @@ auto: will use the system locale setting
fn_enabled
- (string)
+ (boolean)
- (defaults to: 'false')
+ (defaults to: false)
—
@@ -714,6 +716,212 @@ href="https://tools.ietf.org/html/rfc7231#section-5.5.3">tools.ietf.org/html/rfc
+
+
+ fn_banaction
+
+
+ (string)
+
+
+ (defaults to: 'iptables-multiport')
+
+
+ —
+
+
Default banning action
+
+
+
+
+
+
+ fn_banaction_allports
+
+
+ (string)
+
+
+ (defaults to: 'iptables-allports')
+
+
+ —
+
+
Default banning action
+
+
+
+
+
+
+ fn_action_
+
+
+ (string)
+
+
+ (defaults to: '%(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]')
+
+
+ —
+
+
+
+
+
+
+ fn_action_mw
+
+
+ (string)
+
+
+ (defaults to: '%(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
+ %(mta)s-whois[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", protocol="%(protocol)s", chain="%(chain)s"]')
+
+
+ —
+
+
ban & send an e-mail with whois report to the
+destemail.
+
+
+
+
+
+
+ fn_action_mwl
+
+
+ (string)
+
+
+ (defaults to: '%(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
+ %(mta)s-whois-lines[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", logpath=%(logpath)s, chain="%(chain)s"]')
+
+
+ —
+
+
ban & send an e-mail with whois report and
+relevant log lines
+
+
+
+
+
+
+ fn_action_xarf
+
+
+ (string)
+
+
+ (defaults to: '%(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
+ xarf-login-attack[service=%(__name__)s, sender="%(sender)s", logpath=%(logpath)s, port="%(port)s"]')
+
+
+ —
+
+
ban & send a xarf e-mail to abuse contact of
+IP address and include
+relevant log lines.
+
+
+
+
+
+
+ fn_action_cf_mwl
+
+
+ (string)
+
+
+ (defaults to: 'cloudflare[cfuser="%(cfemail)s", cftoken="%(cfapikey)s"]
+ %(mta)s-whois-lines[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", logpath=%(logpath)s, chain="%(chain)s"]')
+
+
+ —
+
+
ban IP on CloudFlare & send an e-mail with
+whois report and relevant
+log lines.
+
+
+
+
+
+
+ fn_action_blocklist_de
+
+
+ (string)
+
+
+ (defaults to: 'blocklist_de[email="%(sender)s", service=%(filter)s, apikey="%(blocklist_de_apikey)s", agent="%(fail2ban_agent)s"]')
+
+
+ —
+
+
Report block via blocklist.de fail2ban
+reporting service API
+
+
+
+
+
+
+ fn_action_badips_report
+
+
+ (string)
+
+
+ (defaults to: 'badips[category="%(__name__)s", agent="%(fail2ban_agent)s"]')
+
+
+ —
+
+
Report ban via badips.com
+
+
(uses action.d/badips.conf for reporting only).
+
+
+
+
+
+
+ fn_default_action
+
+
+ (string)
+
+
+ (defaults to: 'action_')
+
+
+ —
+
+
Choose default action.
+
+
+
+
+
+
+ fn_action_badips
+
+
+ (Any)
+
+
+ (defaults to: 'badips.py[category="%(__name__)s", banaction="%(banaction)s", agent="%(fail2ban_agent)s"]')
+
+
+
+
@@ -724,23 +932,6 @@ href="https://tools.ietf.org/html/rfc7231#section-5.5.3">tools.ietf.org/html/rfc
-104
-105
-106
-107
-108
-109
-110
-111
-112
-113
-114
-115
-116
-117
-118
-119
-120
121
122
123
@@ -804,47 +995,92 @@ href="https://tools.ietf.org/html/rfc7231#section-5.5.3">tools.ietf.org/html/rfc
181
182
183
-184
+184
+185
+186
+187
+188
+189
+190
+191
+192
+193
+194
+195
+196
+197
+198
+199
+200
+201
+202
+203
+204
+205
+206
+207
+208
+209
+210
+211
+212
+213
+214
+215
- # File 'manifests/params.pp', line 104
+ # File 'manifests/params.pp', line 121
class cd_fail2ban::params (
-$pkg_ensure = 'latest',
+$pkg_ensure = 'latest',
-$fn_manage_config = true,
-$fn_enable_service = 'running',
+$fn_manage_config = true,
+$fn_enable_service = 'running',
# fail2ban.conf/local
-$fn_loglevel = 'INFO',
-$fn_logtarget = 'SYSLOG',
-$fn_syslogsocket = 'auto',
-$fn_socket = '/var/run/fail2ban/fail2ban.sock',
-$fn_pidfile = '/var/run/fail2ban/fail2ban.pid',
-$fn_dbfile = '/var/lib/fail2ban/fail2ban.sqlite3',
-$fn_dbpurgeage = '86400',
+$fn_loglevel = 'INFO',
+$fn_logtarget = 'SYSLOG',
+$fn_syslogsocket = 'auto',
+$fn_socket = '/var/run/fail2ban/fail2ban.sock',
+$fn_pidfile = '/var/run/fail2ban/fail2ban.pid',
+$fn_dbfile = '/var/lib/fail2ban/fail2ban.sqlite3',
+$fn_dbpurgeage = '86400',
# jail.conf/local
-$fn_ignoreip = '127.0.0.1/8',
-$fn_ignorecommand = '',
-$fn_bantime = '600',
-$fn_findtime = '600',
-$fn_maxretry = '5',
-$fn_backend = 'auto',
-$fn_usedns = 'warn',
-$fn_logencoding = 'auto',
-$fn_enabled = 'false',
-$fn_filter = '%(__name__)s',
-$fn_destemail = 'root@localhost',
-$fn_sender = 'root@localhost',
-$fn_mta = 'sendmail',
-$fn_protocol = 'tcp',
-$fn_chain = 'INPUT',
-$fn_port = '0:65535',
-$fn_fail2ban_agent = 'Fail2Ban/%(fail2ban_version)s',
-
+$fn_ignoreip = '127.0.0.1/8',
+$fn_ignorecommand = '',
+$fn_bantime = '600',
+$fn_findtime = '600',
+$fn_maxretry = '5',
+$fn_backend = 'auto',
+$fn_usedns = 'warn',
+$fn_logencoding = 'auto',
+$fn_enabled = false,
+$fn_filter = '%(__name__)s',
+$fn_destemail = 'root@localhost',
+$fn_sender = 'root@localhost',
+$fn_mta = 'sendmail',
+$fn_protocol = 'tcp',
+$fn_chain = 'INPUT',
+$fn_port = '0:65535',
+$fn_fail2ban_agent = 'Fail2Ban/%(fail2ban_version)s',
+$fn_banaction = 'iptables-multiport',
+$fn_banaction_allports = 'iptables-allports',
+$fn_action_ = '%(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]',
+$fn_action_mw = '%(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
+ %(mta)s-whois[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", protocol="%(protocol)s", chain="%(chain)s"]',
+$fn_action_mwl = '%(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
+ %(mta)s-whois-lines[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", logpath=%(logpath)s, chain="%(chain)s"]',
+$fn_action_xarf = '%(banaction)s[name=%(__name__)s, bantime="%(bantime)s", port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
+ xarf-login-attack[service=%(__name__)s, sender="%(sender)s", logpath=%(logpath)s, port="%(port)s"]',
+$fn_action_cf_mwl = 'cloudflare[cfuser="%(cfemail)s", cftoken="%(cfapikey)s"]
+ %(mta)s-whois-lines[name=%(__name__)s, sender="%(sender)s", dest="%(destemail)s", logpath=%(logpath)s, chain="%(chain)s"]',
+$fn_action_blocklist_de = 'blocklist_de[email="%(sender)s", service=%(filter)s, apikey="%(blocklist_de_apikey)s", agent="%(fail2ban_agent)s"]',
+$fn_action_badips = 'badips.py[category="%(__name__)s", banaction="%(banaction)s", agent="%(fail2ban_agent)s"]',
+$fn_action_badips_report = 'badips[category="%(__name__)s", agent="%(fail2ban_agent)s"]',
+$fn_default_action = 'action_',
) {
@@ -897,7 +1133,7 @@ $fn_jail_local_erb = 'cd_fail2ban/jail_local.erb'
diff --git a/doc/top-level-namespace.html b/doc/top-level-namespace.html
index 136fa21..f69125f 100644
--- a/doc/top-level-namespace.html
+++ b/doc/top-level-namespace.html
@@ -90,7 +90,7 @@
|