Re: [Monitorix-general] fail2ban filter for Monitorix
Monitorix is a system monitoring tool
Brought to you by:
mikaku
From: Jordi S. <jo...@fi...> - 2020-04-03 07:17:11
|
Hello, The following filter for fail2ban should suffice: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~8<~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ # Fail2Ban filter for Monitorix (HTTP built-in server) # [INCLUDES] before = common.conf [Definition] # Option: failregex # Notes.: regex to match the password failures messages in the logfile. The # host must be matched by a group named "host". The tag "<HOST>" can # be used for standard IP/hostname matching and is only an alias for # (?:::f{4,6}:)?(?P<host>\S+) # Values: TEXT # _daemon = monitorix-httpd failregex = NOTEXIST - \[<HOST>\] .* AUTHERR - \[<HOST>\] .* NOTALLOWED - \[<HOST>\] .* # Option: ignoreregex # Notes.: regex to ignore. If this regex matches, the line is ignored. # Values: TEXT # ignoreregex = ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~8<~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Just let me know if it works for you, and if so, I'll push a new request to the fail2ban project to include it. Regards. On 4/2/20 10:09 AM, Narcis Garcia via Monitorix-general wrote: > htpasswd method with system's crypt() is pretty weak to face brute-force > attacks. > > Does somebody have written an adequate fail2ban filter for http attacks > to Monitorix? > > Thank you. > -- Jordi Sanfeliu FIBRANET Network Services Provider https://www.fibranet.cat |