On 7/13/21 12:34 AM, Tom Hendrikx wrote:

> Please post full configuration if you're not sure what to look for. I 
> have no idea what 'suricata' is though
>
  Suricata is an Intrusion Detection/Prevention Software.

----[ jail ]----
[suricata-1]

enabled  = true

logpath  = /data01/var/log/suricata/fast.log

datepattern = %%m/%%d/%%Y-%%H:%%M:%%S

#

bantime = 12w

maxretry = 1

findtime = 3w

action = iptables[name=sri-1, port="53", protocol=udp]

----[ end ]----

----[ filter ]----
[Definition]

__suricata-1_actions = (?:dropping|refusing)


#
 Sample
# 08/01/2020-09:50:43.513215  [Drop] [**] [1:2030555:1] ET INFO Outbound RRSIG
DNS Query Observed [**] [Classification: Potentially Bad Traffic] [Priority: 2]
{UDP} 192.168.69.246:53 -> 72.196.10.7:30903

# 10/05/2020-09:27:35.208728  [Drop] [**] [1:2009702:5] ET POLICY DNS Update
>From External net [**] [Classification: Potential Corporate Privacy Violation]
[Priority: 1] {UDP} 2.57.122.98:42312 -> 192.168.69.246:53

#



failregex = ^.*\[1\:2016016\:.*\].*? \{UDP\} <HOST>\:.*?

            ^.*\[1\:2101616\:.*\].*? \{UDP\} <HOST>\:.*?

            ^.*\[1\:2009702\:.*\].*? \{UDP\} <HOST>\:.*?

            ^.*\[1\:2030555\:.*\].*? \{UDP\}.*\-\> <HOST>\:.*?



ignoreregex =

datepattern = %%m/%%d/%%Y-%%H:%%M:%%S

----[ end ]----

-- 
James Moe
moe dot james at sohnen-moe dot com
520.743.3936
Think.


_______________________________________________
Fail2ban-users mailing list
Fail2ban-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/fail2ban-users

Reply via email to