LogPath:

[phpmyadmin]
enabled = true
port = http,https
filter = phpmyadmin
action = iptables-multiport[name=phpmyadmin, port="http,https", protocol=tcp]
                  #sendmail-whois[name=PHPMYADMIN, [email protected]]
logpath = /var/log/secure
maxretry = 3

LOG:

2020-02-15 10:42:38,899 fail2ban.jail           [24481]: INFO    Creating new 
jail 'apache-badbots'
2020-02-15 10:42:38,901 fail2ban.jail           [24481]: INFO    Jail 
'apache-badbots' uses poller {}
2020-02-15 10:42:38,901 fail2ban.jail           [24481]: INFO    Initiated 
'polling' backend
2020-02-15 10:42:38,915 fail2ban.filter         [24481]: INFO      maxRetry: 3
2020-02-15 10:42:38,915 fail2ban.filter         [24481]: INFO      findtime: 
3600
2020-02-15 10:42:38,915 fail2ban.actions        [24481]: INFO      banTime: -1
2020-02-15 10:42:38,915 fail2ban.filter         [24481]: INFO      encoding: 
UTF-8
2020-02-15 10:42:38,916 fail2ban.filter         [24481]: INFO    Added logfile: 
'/var/log/httpd/clubenaval.org.br/www_error.log' (pos = 5204, hash = 
e219f0f332829bc88280b9db329549153768f73d)
2020-02-15 10:42:38,916 fail2ban.filter         [24481]: INFO    Added logfile: 
'/var/log/httpd/clubenaval.org.br/teste_error.log' (pos = 4886, hash = 
485cdd7cac30d28770e02f6eef0fe7e2c75bce75)
2020-02-15 10:42:38,916 fail2ban.filter         [24481]: INFO    Added logfile: 
'/var/log/httpd/clubenaval.org.br/phpmyadmin_error.log' (pos = 3616, hash = 
2faa788efe6c2b262cbd656fd3d526e8a168d5ce)
2020-02-15 10:42:38,917 fail2ban.filter         [24481]: INFO    Added logfile: 
'/var/log/httpd/clubenaval.org.br/clubesconveniados_error.log' (pos = 5198, 
hash = 9fe72ef587a33b67602066e13c45873e6b78ef7d)
2020-02-15 10:42:38,917 fail2ban.filter         [24481]: INFO    Added logfile: 
'/var/log/httpd/clubenaval.org.br/centenario_error.log' (pos = 5016, hash = 
26b30b9f9a3df00fb63610da947057d996618dd0)
2020-02-15 10:42:38,918 fail2ban.jail           [24481]: INFO    Creating new 
jail 'vsftpd'
2020-02-15 10:42:38,919 fail2ban.jail           [24481]: INFO    Jail 'vsftpd' 
uses poller {}
2020-02-15 10:42:38,919 fail2ban.jail           [24481]: INFO    Initiated 
'polling' backend
2020-02-15 10:42:38,926 fail2ban.filter         [24481]: INFO      maxRetry: 3
2020-02-15 10:42:38,926 fail2ban.filter         [24481]: INFO      findtime: 
3600
2020-02-15 10:42:38,926 fail2ban.actions        [24481]: INFO      banTime: -1
2020-02-15 10:42:38,927 fail2ban.filter         [24481]: INFO      encoding: 
UTF-8
2020-02-15 10:42:38,927 fail2ban.filter         [24481]: INFO    Added logfile: 
'/var/log/vsftpd.log' (pos = 1345, hash = 
6ae2e84f3a2fd1944c152a0c21907b5eedb13fcb)
2020-02-15 10:42:38,930 fail2ban.jail           [24481]: INFO    Jail 
'phpmyadmin' started
2020-02-15 10:42:38,931 fail2ban.jail           [24481]: INFO    Jail 
'apache-auth' started
2020-02-15 10:42:38,934 fail2ban.jail           [24481]: INFO    Jail 
'drupal-comment' started
2020-02-15 10:42:38,936 fail2ban.jail           [24481]: INFO    Jail 
'drupal-auth' started
2020-02-15 10:42:38,945 fail2ban.jail           [24481]: INFO    Jail 
'apache-noscript' started
2020-02-15 10:42:38,948 fail2ban.jail           [24481]: INFO    Jail 
'apache-overflows' started
2020-02-15 10:42:38,953 fail2ban.jail           [24481]: INFO    Jail 
'apache-badbots' started
2020-02-15 10:42:38,963 fail2ban.jail           [24481]: INFO    Jail 'vsftpd' 
started
2020-02-15 10:42:39,156 fail2ban.actions        [24481]: NOTICE  [vsftpd] 
Restore Ban 177.124.244.58

 ---- Ativado Sáb, 15 fev 2020 11:21:35 -0300 Henrique Fagundes 
<[email protected]> escreveu ----
 > Friend,
 > 
 > Follow my /etc/fail2ban/jail.conf settings:
 > 
 > [INCLUDES]
 > before = paths-fedora.conf
 > 
 > [DEFAULT]
 > ignoreip = 127.0.0.1/8
 > ignorecommand =
 > 
 > bantime  = -1
 > findtime  = 3600
 > maxretry = 3
 > 
 > backend = auto
 > usedns = warn
 > logencoding = auto
 > enabled = false
 > filter = %(__name__)s
 > destemail = [email protected]
 > sender = [email protected]
 > mta = sendmail
 > protocol = tcp
 > chain = INPUT
 > port = 0:65535
 > 
 > fail2ban_agent = Fail2Ban/%(fail2ban_version)s
 > 
 > banaction = iptables-multiport
 > banaction_allports = iptables-allports
 > 
 > action_ = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", 
 > port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
 > 
 > action_mw = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", 
 > port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
 >             %(mta)s-whois[name=%(__name__)s, sender="%(sender)s", 
 > dest="%(destemail)s", protocol="%(protocol)s", chain="%(chain)s"]
 > 
 > action_mwl = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", 
 > port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
 >              %(mta)s-whois-lines[name=%(__name__)s, sender="%(sender)s", 
 > dest="%(destemail)s", logpath=%(logpath)s, chain="%(chain)s"]
 > 
 > action_xarf = %(banaction)s[name=%(__name__)s, bantime="%(bantime)s", 
 > port="%(port)s", protocol="%(protocol)s", chain="%(chain)s"]
 >              xarf-login-attack[service=%(__name__)s, sender="%(sender)s", 
 > logpath=%(logpath)s, port="%(port)s"]
 > 
 > action_cf_mwl = cloudflare[cfuser="%(cfemail)s", cftoken="%(cfapikey)s"]
 >                 %(mta)s-whois-lines[name=%(__name__)s, sender="%(sender)s", 
 > dest="%(destemail)s", logpath=%(logpath)s, chain="%(chain)s"]
 > 
 > action_blocklist_de  = blocklist_de[email="%(sender)s", service=%(filter)s, 
 > apikey="%(blocklist_de_apikey)s", agent="%(fail2ban_agent)s"]
 > 
 > action_badips = badips.py[category="%(__name__)s", 
 > banaction="%(banaction)s", agent="%(fail2ban_agent)s"]
 > action_badips_report = badips[category="%(__name__)s", 
 > agent="%(fail2ban_agent)s"]
 > 
 > action = %(action_)s
 > 
 > [sshd]
 > port    = 17169
 > logpath = %(sshd_log)s
 > backend = %(sshd_backend)s
 > 
 > [sshd-ddos]
 > port    = 17169
 > logpath = %(sshd_log)s
 > backend = %(sshd_backend)s
 > 
 > [dropbear]
 > port     = 17169
 > logpath  = %(dropbear_log)s
 > backend  = %(dropbear_backend)s
 > 
 > [selinux-ssh]
 > port     = 17169
 > logpath  = %(auditd_log)s
 > 
 > [phpmyadmin]
 > enabled = true
 > port = http,https
 > filter = phpmyadmin
 > action = iptables-multiport[name=phpmyadmin, port="http,https", protocol=tcp]
 >          #sendmail-whois[name=PHPMYADMIN, [email protected]]
 > logpath = /var/log/secure
 > maxretry = 3
 > 
 > [apache-auth]
 > enabled  = true
 > port     = http,https
 > filter   = apache-auth
 > action = iptables-multiport[name=apache-auth, port="http,https", 
 > protocol=tcp]
 >          #sendmail-whois[name=APACHE, [email protected]]
 > logpath  = /var/log/httpd/*/*_error.log
 > maxretry = 3
 > 
 > [drupal-comment]
 > enabled  = true
 > port     = http,https
 > filter   = drupal-comment
 > action = iptables-multiport[name=drupal-comment, port="http,https", 
 > protocol=tcp]
 >          #sendmail-whois[name=DRUPAL, [email protected]]
 > logpath  = /var/log/messages
 > maxretry = 3
 > 
 > [drupal-auth]
 > enabled = true
 > port    = http,https
 > filter  = drupal-auth
 > action = iptables-multiport[name=drupal-auth, port="http,https", 
 > protocol=tcp]
 >          #sendmail-whois[name=DRUPAL, [email protected]]
 > logpath = /var/log/messages
 > maxretry = 3
 > 
 > [apache-noscript]
 > enabled  = true
 > port     = http,https
 > filter   = apache-noscript
 > action = iptables-multiport[name=apache-noscript, port="http,https", 
 > protocol=tcp]
 >          #sendmail-whois[name=APACHE, [email protected]]
 > logpath  = /var/log/httpd/*/*_error.log
 > maxretry = 3
 > 
 > [apache-overflows]
 > enabled  = true
 > port     = http,https
 > filter   = apache-overflows
 > action = iptables-multiport[name=apache-overflows, port="http,https", 
 > protocol=tcp]
 >          #sendmail-whois[name=APACHE, [email protected]]
 > logpath  = /var/log/httpd/*/*_error.log
 > maxretry = 3
 > 
 > [apache-badbots]
 > enabled  = true
 > port     = http,https
 > filter   = apache-badbots
 > action = iptables-multiport[name=apache-badbots, port="http,https", 
 > protocol=tcp]
 >          #sendmail-whois[name=APACHE, [email protected]]
 > logpath  = /var/log/httpd/*/*_error.log
 > maxretry = 3
 > 
 > [openhab-auth]
 > filter = openhab
 > action = iptables-allports[name=NoAuthFailures]
 > logpath = /opt/openhab/logs/request.log
 > 
 > [nginx-http-auth]
 > port    = http,https
 > logpath = %(nginx_error_log)s
 > 
 > [nginx-limit-req]
 > port    = http,https
 > logpath = %(nginx_error_log)s
 > 
 > [nginx-botsearch]
 > port     = http,https
 > logpath  = %(nginx_error_log)s
 > maxretry = 2
 > 
 > [php-url-fopen]
 > port    = http,https
 > logpath = %(nginx_access_log)s
 >           %(apache_access_log)s
 > 
 > [suhosin]
 > port    = http,https
 > logpath = %(suhosin_log)s
 > 
 > [lighttpd-auth]
 > port    = http,https
 > logpath = %(lighttpd_error_log)s
 > 
 > [roundcube-auth]
 > port     = http,https
 > logpath  = %(roundcube_errors_log)s
 > 
 > [openwebmail]
 > port     = http,https
 > logpath  = /var/log/openwebmail.log
 > 
 > [horde]
 > port     = http,https
 > logpath  = /var/log/horde/horde.log
 > 
 > [groupoffice]
 > port     = http,https
 > logpath  = /home/groupoffice/log/info.log
 > 
 > [sogo-auth]
 > port     = http,https
 > logpath  = /var/log/sogo/sogo.log
 > 
 > [tine20]
 > logpath  = /var/log/tine20/tine20.log
 > port     = http,https
 > 
 > #[drupal-auth]
 > #port     = http,https
 > #logpath  = %(syslog_daemon)s
 > #backend  = %(syslog_backend)s
 > 
 > [guacamole]
 > port     = http,https
 > logpath  = /var/log/tomcat*/catalina.out
 > 
 > [monit]
 > port = 2812
 > logpath  = /var/log/monit
 > 
 > [webmin-auth]
 > port    = 10000
 > logpath = %(syslog_authpriv)s
 > backend = %(syslog_backend)s
 > 
 > [froxlor-auth]
 > port    = http,https
 > logpath  = %(syslog_authpriv)s
 > backend  = %(syslog_backend)s
 > 
 > [squid]
 > port     =  80,443,3128,8080
 > logpath = /var/log/squid/access.log
 > 
 > [3proxy]
 > port    = 3128
 > logpath = /var/log/3proxy.log
 > 
 > [pure-ftpd]
 > port     = ftp,ftp-data,ftps,ftps-data
 > logpath  = %(pureftpd_log)s
 > backend  = %(pureftpd_backend)s
 > 
 > [gssftpd]
 > port     = ftp,ftp-data,ftps,ftps-data
 > logpath  = %(syslog_daemon)s
 > backend  = %(syslog_backend)s
 > 
 > [wuftpd]
 > port     = ftp,ftp-data,ftps,ftps-data
 > logpath  = %(wuftpd_log)s
 > backend  = %(wuftpd_backend)s
 > 
 > [vsftpd]
 > enabled = true
 > port     = ftp,ftp-data,ftps,ftps-data
 > logpath  = %(vsftpd_log)s
 > enable = true
 > action = iptables-multiport[name=vsftpd, port="ftp,ftp-data,ftps,ftps-data", 
 > protocol=tcp]
 >          #sendmail-whois[name=fail2ban-vsftpd-bruteforce, 
 > [email protected]]
 > maxretry = 3
 > 
 > [assp]
 > port     = smtp,465,submission
 > logpath  = /var/log/mail.log
 > 
 > [courier-smtp]
 > port     = smtp,465,submission
 > logpath  = %(syslog_mail)s
 > backend  = %(syslog_backend)s
 > 
 > [postfix]
 > port     = smtp,465,submission
 > logpath  = %(postfix_log)s
 > backend  = %(postfix_backend)s
 > 
 > [postfix-rbl]
 > port     = smtp,465,submission
 > logpath  = %(postfix_log)s
 > backend  = %(postfix_backend)s
 > maxretry = 1
 > 
 > [sendmail-auth]
 > port    = submission,465,smtp
 > logpath = %(syslog_mail)s
 > backend = %(syslog_backend)s
 > 
 > [sendmail-reject]
 > port     = smtp,465,submission
 > logpath  = %(syslog_mail)s
 > backend  = %(syslog_backend)s
 > 
 > [qmail-rbl]
 > filter  = qmail
 > port    = smtp,465,submission
 > logpath = /service/qmail/log/main/current
 > 
 > [dovecot]
 > port    = pop3,pop3s,imap,imaps,submission,465,sieve
 > logpath = %(dovecot_log)s
 > backend = %(dovecot_backend)s
 > 
 > [sieve]
 > port   = smtp,465,submission
 > logpath = %(dovecot_log)s
 > backend = %(dovecot_backend)s
 > 
 > [solid-pop3d]
 > port    = pop3,pop3s
 > logpath = %(solidpop3d_log)s
 > 
 > [exim]
 > port   = smtp,465,submission
 > logpath = %(exim_main_log)s
 > 
 > [exim-spam]
 > port   = smtp,465,submission
 > logpath = %(exim_main_log)s
 > 
 > [kerio]
 > port    = imap,smtp,imaps,465
 > logpath = /opt/kerio/mailserver/store/logs/security.log
 > 
 > [courier-auth]
 > port     = smtp,465,submission,imap3,imaps,pop3,pop3s
 > logpath  = %(syslog_mail)s
 > backend  = %(syslog_backend)s
 > 
 > [postfix-sasl]
 > port     = smtp,465,submission,imap3,imaps,pop3,pop3s
 > logpath  = %(postfix_log)s
 > backend  = %(postfix_backend)s
 > 
 > [perdition]
 > port   = imap3,imaps,pop3,pop3s
 > logpath = %(syslog_mail)s
 > backend = %(syslog_backend)s
 > 
 > [squirrelmail]
 > port = smtp,465,submission,imap2,imap3,imaps,pop3,pop3s,http,https,socks
 > logpath = /var/lib/squirrelmail/prefs/squirrelmail_access_log
 > 
 > [cyrus-imap]
 > port   = imap3,imaps
 > logpath = %(syslog_mail)s
 > backend = %(syslog_backend)s
 > 
 > [uwimap-auth]
 > port   = imap3,imaps
 > logpath = %(syslog_mail)s
 > backend = %(syslog_backend)s
 > 
 > [named-refused]
 > port     = domain,953
 > logpath  = /var/log/named/security.log
 > 
 > [nsd]
 > port     = 53
 > action   = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", 
 > protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
 >            %(banaction)s[name=%(__name__)s-udp, port="%(port)s", 
 > protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
 > logpath = /var/log/nsd.log
 > 
 > [asterisk]
 > port     = 5060,5061
 > action   = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", 
 > protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
 >            %(banaction)s[name=%(__name__)s-udp, port="%(port)s", 
 > protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
 >            %(mta)s-whois[name=%(__name__)s, dest="%(destemail)s"]
 > logpath  = /var/log/asterisk/messages
 > maxretry = 10
 > 
 > [freeswitch]
 > port     = 5060,5061
 > action   = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", 
 > protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
 >            %(banaction)s[name=%(__name__)s-udp, port="%(port)s", 
 > protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
 >            %(mta)s-whois[name=%(__name__)s, dest="%(destemail)s"]
 > logpath  = /var/log/freeswitch.log
 > maxretry = 10
 > 
 > [mysqld-auth]
 > port     = 3306
 > logpath  = %(mysql_log)s
 > backend  = %(mysql_backend)s
 > 
 > [mongodb-auth]
 > port     = 27017
 > logpath  = /var/log/mongodb/mongodb.log
 > 
 > [recidive]
 > logpath  = /var/log/fail2ban.log
 > banaction = %(banaction_allports)s
 > bantime  = 604800  ; 1 week
 > findtime = 86400   ; 1 day
 > 
 > [pam-generic]
 > banaction = %(banaction_allports)s
 > logpath  = %(syslog_authpriv)s
 > backend  = %(syslog_backend)s
 > 
 > [xinetd-fail]
 > banaction = iptables-multiport-log
 > logpath   = %(syslog_daemon)s
 > backend   = %(syslog_backend)s
 > maxretry  = 2
 > 
 > [stunnel]
 > logpath = /var/log/stunnel4/stunnel.log
 > 
 > [ejabberd-auth]
 > port    = 5222
 > logpath = /var/log/ejabberd/ejabberd.log
 > 
 > [counter-strike]
 > logpath = /opt/cstrike/logs/L[0-9]*.log
 > tcpport = 27030,27031,27032,27033,27034,27035,27036,27037,27038,27039
 > udpport = 
 > 1200,27000,27001,27002,27003,27004,27005,27006,27007,27008,27009,27010,27011,27012,27013,27014,27015
 > action  = %(banaction)s[name=%(__name__)s-tcp, port="%(tcpport)s", 
 > protocol="tcp", chain="%(chain)s", actname=%(banaction)s-tcp]
 >            %(banaction)s[name=%(__name__)s-udp, port="%(udpport)s", 
 > protocol="udp", chain="%(chain)s", actname=%(banaction)s-udp]
 > 
 > [nagios]
 > logpath  = %(syslog_daemon)s     ; nrpe.cfg may define a different 
 > log_facility
 > backend  = %(syslog_backend)s
 > maxretry = 1
 > 
 > [oracleims]
 > logpath = /opt/sun/comms/messaging64/log/mail.log_current
 > banaction = %(banaction_allports)s
 > 
 > [directadmin]
 > logpath = /var/log/directadmin/login.log
 > port = 2222
 > 
 > [portsentry]
 > logpath  = /var/lib/portsentry/portsentry.history
 > maxretry = 1
 > 
 > [pass2allow-ftp]
 > port         = ftp,ftp-data,ftps,ftps-data
 > knocking_url = /knocking/
 > filter       = apache-pass[knocking_url="%(knocking_url)s"]
 > logpath      = %(apache_access_log)s
 > blocktype    = RETURN
 > returntype   = DROP
 > bantime      = 3600
 > maxretry     = 1
 > findtime     = 1
 > 
 > [murmur]
 > port     = 64738
 > action   = %(banaction)s[name=%(__name__)s-tcp, port="%(port)s", 
 > protocol=tcp, chain="%(chain)s", actname=%(banaction)s-tcp]
 >            %(banaction)s[name=%(__name__)s-udp, port="%(port)s", 
 > protocol=udp, chain="%(chain)s", actname=%(banaction)s-udp]
 > logpath  = /var/log/mumble-server/mumble-server.log
 > 
 > [screensharingd]
 > logpath  = /var/log/system.log
 > logencoding = utf-8
 > 
 > [haproxy-http-auth]
 > logpath  = /var/log/haproxy.log
 > 
 > [slapd]
 > port    = ldap,ldaps
 > filter  = slapd
 > logpath = /var/log/slapd.log
 > 
 > 
 > Atenciosamente, 
 > 
 > Henrique Fagundes 
 > Analista de Suporte Linux 
 > [email protected] 
 > Skype: magnata-br-rj 
 > Linux User: 475399 
 > 
 > https://www.aprendendolinux.com 
 > https://www.facebook.com/AprendendoLinux 
 > https://youtube.com/AprendendoLinux 
 > https://twitter.com/AprendendoLinux 
 > https://t.me/AprendendoLinux 
 > https://t.me/GrupoAprendendoLinux 
 > ______________________________________________________________________ 
 > Participe do Grupo Aprendendo Linux 
 > https://listas.aprendendolinux.com/listinfo/aprendendolinux 
 > 
 > Ou envie um e-mail para: 
 > [email protected] 
 > 
 > 
 >  ---- Ativado Sáb, 15 fev 2020 10:56:55 -0300 Dudi Goldenberg 
 > <[email protected]> escreveu ----
 >  > Hi,
 >  > 
 >  > The regex is fine for the log lines that you showed.
 >  > 
 >  > Try to go over the rest of the jail and verify that its properly 
 > configured.
 >  > 
 >  > Regards,
 >  > 
 >  > Dudi
 >  > 
 >  > -----Original Message-----
 >  > From: Henrique Fagundes [mailto:[email protected]] 
 >  > Sent: Saturday, February 15, 2020 15:45
 >  > To: Dudi Goldenberg <[email protected]>
 >  > Cc: Fail2ban Users <[email protected]>
 >  > Subject: RE: [Fail2ban-users] Help with Fail2Ban on PhpMyAdmin
 >  > 
 >  > Friend,
 >  > 
 >  > In practice, it doesn't work!
 >  > I am purposely missing the logins and does not block.
 >  > 
 >  > I did a test with FTP and it blocks normally.
 >  > I don't know what's going on.
 >  > 
 >  >  ---- Ativado Sáb, 15 fev 2020 10:32:34 -0300 Dudi Goldenberg 
 > <[email protected]> escreveu ----  > Well,  >  > According to the test it did 
 > work:
 >  >  >
 >  >  > Lines: 772 lines, 0 ignored, 182 matched, 590 missed [processed in 
 > 0.08 sec]  >  > So you have 182 matches.
 >  >  >
 >  >  > Regards,
 >  >  >
 >  >  > Dudi
 >  >  >
 >  >  > -----Original Message-----
 >  >  > From: Henrique Fagundes [mailto:[email protected]]
 >  >  > Sent: Saturday, February 15, 2020 15:28  > To: Dudi Goldenberg 
 > <[email protected]>  > Cc: Fail2ban Users 
 > <[email protected]>
 >  >  > Subject: RE: [Fail2ban-users] Help with Fail2Ban on PhpMyAdmin  >  > 
 > Friend,  >  > Unfortunately, the rule you gave me didn't work!
 >  >  >
 >  >  > The log file is /var/ log /secure.
 >  >  >
 >  >  > I ran the command below:
 >  >  >
 >  >  >  fail2ban-regex /var/log/secure /etc/fail2ban/filter.d/phpmyadmin.conf
 >  >  >
 >  >  > That was the way out:
 >  >  >
 >  >  > Running tests
 >  >  > =============
 >  >  > 
 >  >  > Use   failregex filter file : phpmyadmin, basedir: /etc/fail2ban
 >  >  > Use         log file : /var/log/secure
 >  >  > Use         encoding : UTF-8
 >  >  >
 >  >  >
 >  >  > Results
 >  >  > =======
 >  >  >
 >  >  > Failregex: 182 total
 >  >  > |-  #) [# of hits] regular expression
 >  >  > |   1) [182] user denied: .+ from <HOST>\s*$
 >  >  > `-
 >  >  >
 >  >  > Ignoreregex: 0 total
 >  >  >
 >  >  > Date template hits:
 >  >  > |- [# of hits] date format
 >  >  > |  [772] {^LN-BEG}(?:DAY )?MON Day 
 > %k:Minute:Second(?:\.Microseconds)?(?: ExYear)?
 >  >  > `-
 >  >  >
 >  >  > Lines: 772 lines, 0 ignored, 182 matched, 590 missed [processed in 
 > 0.08 sec]  >  > Missed line(s): too many to print.  Use --print-all-missed 
 > to print all 590 lines  >  > Is there anything else I can do to resolve the 
 > issue?
 >  >  >
 >  >  >  ---- Ativado Sáb, 15 fev 2020 10:07:12 -0300 Dudi Goldenberg 
 > <[email protected]> escreveu ----  > Hi,  >  > You should edit 
 > /etc/fail2ban/filter.d/phpmyadmin.conf and modify the failregex line to read:
 >  >  >  >
 >  >  >  > failregex = user denied: .+ from <HOST>\s*$  >  > The tst is a file 
 > I created with the log lines in it for testing...
 >  >  >  >
 >  >  >  > After you modify phpmyadmin.conf this should work and show matches:
 >  >  >  >
 >  >  >  > fail2ban-regex /path/to/logfile 
 > /etc/fail2ban/filter.d/phpmyadmin.conf
 >  >  >  >
 >  >  >  > Make sure you insert the real path to the log file instead of 
 > /path/to/logfile.
 >  >  >  >
 >  >  >  > Regards,
 >  >  >  >
 >  >  >  > Dudi
 >  >  >  >
 >  >  >  > -----Original Message-----
 >  >  >  > From: Henrique Fagundes [mailto:[email protected]]
 >  >  >  > Sent: Saturday, February 15, 2020 13:26  > To: Dudi Goldenberg 
 > <[email protected]>  > Subject: RE: [Fail2ban-users] Help with Fail2Ban on 
 > PhpMyAdmin  >  > Friend,  >  > Good Morning! Thanks for answering!
 >  >  >  > I tested his regular expression and it didn't work, unfortunately.
 >  >  >  >
 >  >  >  > The output of my command was like this:
 >  >  >  >
 >  >  >  > [root@www ~]# fail2ban-regex tst 
 > /etc/fail2ban/filter.d/phpmyadmin.conf
 >  >  >  >
 >  >  >  > Running tests
 >  >  >  > =============
 >  >  >  > 
 >  >  >  > Use   failregex filter file : phpmyadmin, basedir: /etc/fail2ban
 >  >  >  > Use      single line : tst
 >  >  >  >
 >  >  >  >
 >  >  >  > Results
 >  >  >  > =======
 >  >  >  >
 >  >  >  > Failregex: 0 total
 >  >  >  >
 >  >  >  > Ignoreregex: 0 total
 >  >  >  >
 >  >  >  > Date template hits:
 >  >  >  >
 >  >  >  > Lines: 1 lines, 0 ignored, 0 matched, 1 missed [processed in 0.05 
 > sec]  >  > |- Missed line(s):
 >  >  >  > |  tst
 >  >  >  > `-
 >  >  >  >
 >  >  >  > Is there anything else I can do to resolve this issue?
 >  >  >  >
 >  >  >  > I am grateful!
 >  >  >  >
 >  >  >  >
 >  >  >  >
 >  >  >  > Atenciosamente,
 >  >  >  >
 >  >  >  > Henrique Fagundes
 >  >  >  > Analista de Suporte Linux
 >  >  >  > [email protected]
 >  >  >  > Skype: magnata-br-rj
 >  >  >  > Linux User: 475399
 >  >  >  >
 >  >  >  > https://www.aprendendolinux.com
 >  >  >  > https://www.facebook.com/AprendendoLinux
 >  >  >  > https://youtube.com/AprendendoLinux
 >  >  >  > https://twitter.com/AprendendoLinux
 >  >  >  > https://t.me/AprendendoLinux
 >  >  >  > https://t.me/GrupoAprendendoLinux
 >  >  >  > 
 > ______________________________________________________________________
 >  >  >  > Participe do Grupo Aprendendo Linux  >  > 
 > https://listas.aprendendolinux.com/listinfo/aprendendolinux
 >  >  >  >
 >  >  >  > Ou envie um e-mail para: 
 >  >  >  > [email protected]
 >  >  >  >
 >  >  >  >
 >  >  >  >  ---- Ativado Sáb, 15 fev 2020 05:24:41 -0300 Dudi Goldenberg 
 > <[email protected]> escreveu ----  > HI,  >  > I pasted the wrong line.... 
 > sorry.
 >  >  >  >  >
 >  >  >  >  > This works:
 >  >  >  >  >
 >  >  >  >  > failregex = user denied: .+ from <HOST>\s*$  >  > ===========  > 
 >  > root@mail:~# fail2ban-regex tst /etc/fail2ban/filter.d/test.conf  >  > 
 > Running tests  > =============  > 
 >  >  >  >  > Use   failregex file : /etc/fail2ban/filter.d/webmin-auth.conf
 >  >  >  >  > Use         log file : tst
 >  >  >  >  >
 >  >  >  >  >
 >  >  >  >  > Results
 >  >  >  >  > =======
 >  >  >  >  >
 >  >  >  >  > Failregex: 1 total
 >  >  >  >  > |-  #) [# of hits] regular expression
 >  >  >  >  > |   4) [1] user denied: .+ from <HOST>\s*$
 >  >  >  >  > `-
 >  >  >  >  >
 >  >  >  >  > Ignoreregex: 0 total
 >  >  >  >  >
 >  >  >  >  > Date template hits:
 >  >  >  >  > |- [# of hits] date format
 >  >  >  >  > |  [1] MONTH Day Hour:Minute:Second  >  > `-  >  >  >  > Lines: 
 > 1 lines, 0 ignored, 1 matched, 0 missed  >  > Regards,  >  > Dudi  >  >  > 
 > -----Original Message-----  > From: Henrique Fagundes 
 > [mailto:[email protected]]
 >  >  >  >  > Sent: Saturday, February 15, 2020 3:34  > To: fail2ban-users 
 > <[email protected]>
 >  >  >  >  > Subject: [Fail2ban-users] Help with Fail2Ban on PhpMyAdmin  >  > 
 > Dear Colleagues,  >  > I begin by apologizing for any communication error, 
 > as I am Brazilian and I still try to adapt with the English language.
 >  >  >  >  >
 >  >  >  >  > I'm having a hard time getting Fail2Ban to work on phpmyadmin.
 >  >  >  >  >
 >  >  >  >  > I'm using CentOS 8.1.1911 and fail2ban 0.10.5-2.
 >  >  >  >  > My PhpMyAdmin is version 4.9.0.1.
 >  >  >  >  >
 >  >  >  >  > I noticed that PhpMyAdmin logs login failures in the “/var/log/ 
 > secure” file.
 >  >  >  >  >
 >  >  >  >  > And he has an output like this:
 >  >  >  >  >
 >  >  >  >  > Feb 14 21:40:37 www phpMyAdmin[3982]: user denied: root 
 > (mysql-denied) from 177.122.254.10 Feb 14 21:42:07 www phpMyAdmin[3978]: 
 > user denied: root (mysql-denied) from 177.122.254.10 Feb 14 21:42:09 www 
 > phpMyAdmin[3982]: user denied: root (mysql-denied) from 177.122.254.10 Feb 
 > 14 21:48:06 www phpMyAdmin[3981]: user denied: root (mysql-denied) from 
 > 177.122.254.10  >  > So, I configured my “/etc/fail2ban/jail.conf” like this:
 >  >  >  >  >
 >  >  >  >  > [phpmyadmin]
 >  >  >  >  > enabled = true
 >  >  >  >  > port = http,https
 >  >  >  >  > filter = phpmyadmin
 >  >  >  >  > action = iptables-multiport[name=phpmyadmin, port="http,https", 
 > protocol=tcp] sendmail-whois[name=PHPMYADMIN, [email protected]] 
 > logpath = /var/log/secure maxretry = 3  >  > And the filter configuration 
 > file (/etc/fail2ban/filter.d/phpmyadmin.conf), the expressions are like this:
 >  >  >  >  >
 >  >  >  >  > [Definition]
 >  >  >  >  > denied = mysql-denied|allow-denied|root-denied|empty-denied
 >  >  >  >  > failregex = ^<HOST> -.*(?:%(denied)s)$  > ignoreregex =  >  > I 
 > believe I am not able to correctly form the expression, as Fail2Ban is not 
 > blocking at all.
 >  >  >  >  >
 >  >  >  >  > Could someone help me in this matter?
 >  >  >  >  >
 >  >  >  >  > I'll be very grateful.
 >  >  >  >  >
 >  >  >  >  >
 >  >  >  >  > _______________________________________________
 >  >  >  >  > Fail2ban-users mailing list
 >  >  >  >  > [email protected]
 >  >  >  >  > https://lists.sourceforge.net/lists/listinfo/fail2ban-users
 >  >  >  >  >
 >  >  >  >
 >  >  >
 >  >
 > 
 > 
 > _______________________________________________
 > Fail2ban-users mailing list
 > [email protected]
 > https://lists.sourceforge.net/lists/listinfo/fail2ban-users
 >


_______________________________________________
Fail2ban-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/fail2ban-users

Reply via email to