You are here

README.txt in Fail2ban Firewall Integration 7.2

Same filename and directory in other branches
  1. 6 README.txt
  2. 7 README.txt
== FAIL2BAN ==

This module allows you to submit IP addresses to the firewall, to stop
them comment spamming your site or performing brute-force dictionary
attacks.

The fail2ban daemon monitors application and system log files such as
/var/log/auth.log or /var/log/apache/access.log and bans IP addresses by
updating or adding firewall rules. The expiry time of these bans and other
options can be configured.

Note that you do not need this module if Drupals syslog module already logs
all events you want to sue for fail2ban actions!

== REQUIREMENTS ==

To make use of fail2ban you will need to install the fail2ban system utility.
For most distributions it is already packaged. See http://www.fail2ban.org/
for more info.


== INSTALLATION ==

1. Extract the module to sites/*/modules and enable it via the module
   admin page.

2. In the contrib/ directory you will find the jail.local.conf file,
   which contains configuration snippets. You can add these snippets to
   your /etc/fail2ban/jail.conf file or copy the entire file to
   /etc/fail2ban/jail.local. The latter is the recommended method.

   The filters are DISABLED by default in jail.local, so you need to
   enable the jails by setting "enabled = true".

   Copy the filters from contrib/filter.d to /etc/fail2ban/filter.d

3. Restart fail2ban via "/etc/init.d/fail2ban restart".

The system utility se pre-configured with the localhost address whitelisted.
It is a good diea to also whitelist the IP address you use you manage your
Drupal site.


== CONFIGURATION ==

Browse to http://example.com/?q=admin/config/development/logging/fail2ban to
change the fail2ban settings.

When the checkbox on http://example.com/?q=admin/content/comment site is
enabled and a comment is selected to be unpublished, the module will create
a log entry, which in turn causes fail2ban to block the IP address that the
comment was submitted from for the period set in /etc/fail2ban/jail.local.


== AUTHORS ==

Peter Lieverdink <me@cafuego.net>

Additional jails were provided by Tipi Koivisto <tipi@koivisto.eu>


== LICENSE ==

http://www.gnu.org/licenses/gpl-2.0.html

File

README.txt
View source
  1. == FAIL2BAN ==
  2. This module allows you to submit IP addresses to the firewall, to stop
  3. them comment spamming your site or performing brute-force dictionary
  4. attacks.
  5. The fail2ban daemon monitors application and system log files such as
  6. /var/log/auth.log or /var/log/apache/access.log and bans IP addresses by
  7. updating or adding firewall rules. The expiry time of these bans and other
  8. options can be configured.
  9. Note that you do not need this module if Drupals syslog module already logs
  10. all events you want to sue for fail2ban actions!
  11. == REQUIREMENTS ==
  12. To make use of fail2ban you will need to install the fail2ban system utility.
  13. For most distributions it is already packaged. See http://www.fail2ban.org/
  14. for more info.
  15. == INSTALLATION ==
  16. 1. Extract the module to sites/*/modules and enable it via the module
  17. admin page.
  18. 2. In the contrib/ directory you will find the jail.local.conf file,
  19. which contains configuration snippets. You can add these snippets to
  20. your /etc/fail2ban/jail.conf file or copy the entire file to
  21. /etc/fail2ban/jail.local. The latter is the recommended method.
  22. The filters are DISABLED by default in jail.local, so you need to
  23. enable the jails by setting "enabled = true".
  24. Copy the filters from contrib/filter.d to /etc/fail2ban/filter.d
  25. 3. Restart fail2ban via "/etc/init.d/fail2ban restart".
  26. The system utility se pre-configured with the localhost address whitelisted.
  27. It is a good diea to also whitelist the IP address you use you manage your
  28. Drupal site.
  29. == CONFIGURATION ==
  30. Browse to http://example.com/?q=admin/config/development/logging/fail2ban to
  31. change the fail2ban settings.
  32. When the checkbox on http://example.com/?q=admin/content/comment site is
  33. enabled and a comment is selected to be unpublished, the module will create
  34. a log entry, which in turn causes fail2ban to block the IP address that the
  35. comment was submitted from for the period set in /etc/fail2ban/jail.local.
  36. == AUTHORS ==
  37. Peter Lieverdink
  38. Additional jails were provided by Tipi Koivisto
  39. == LICENSE ==
  40. http://www.gnu.org/licenses/gpl-2.0.html