fail2ban/config/action.d
Sergey G. Brester 3bead7c011
Update comments in action
jail.conf shall be unmodified (jails are ideally in jail.local or jail.d/*.conf)
2026-02-02 03:04:25 +01:00
..
abuseipdb.conf Update abuseipdb.conf 2024-05-20 15:34:24 +02:00
apf.conf
apprise.conf Update comments in action 2026-02-02 03:04:25 +01:00
blocklist_de.conf
bsd-ipfw.conf [DATALAD RUNCMD] run codespell throughout fixing typo automagically 2023-11-18 10:04:04 -05:00
cloudflare-token.conf action.d/cloudflare-token.conf: fixes actionunban retrieving of CF-ID from IP: 2025-03-01 20:19:35 +01:00
cloudflare.conf action.d/cloudflare.conf: better IPv6 capability 2021-01-11 15:23:40 +01:00
complain.conf Fix more typos 2023-11-22 16:32:05 +00:00
csf.conf
dshield.conf fixed possible RCE vulnerability, unset escape variable (default tilde) stops consider "~" char after new-line as composing escape sequence 2021-06-21 17:12:53 +02:00
dummy.conf
firewallcmd-allports.conf
firewallcmd-common.conf
firewallcmd-ipset.conf action.d/*-ipset.conf: workaround sporadic failures by stop if destroying ipset too fast (sleep a bit in error case and repeat); 2024-11-07 19:28:53 +01:00
firewallcmd-multiport.conf Revert "action.d/firewallcmd-*.conf (multiport only): fixed port range selector, replacing : with -;" 2021-11-01 11:45:40 +01:00
firewallcmd-new.conf Revert "action.d/firewallcmd-*.conf (multiport only): fixed port range selector, replacing : with -;" 2021-11-01 11:45:40 +01:00
firewallcmd-rich-logging.conf action.d/firewallcmd-*.conf (multiport only): fixed port range selector, replacing : with -; 2020-09-03 16:41:23 +02:00
firewallcmd-rich-rules.conf action.d/firewallcmd-rich-*.conf: fixed incorrect quoting, disabling port variable expansion by substitution of rich rule; closes gh-3815 2024-08-07 22:43:42 +02:00
helpers-common.conf
hostsdeny.conf
ipfilter.conf
ipfw.conf
iptables-allports.conf first attempt to make certain standard actions breakdown safe starting with iptables: 2020-02-14 12:16:25 +01:00
iptables-ipset-proto4.conf [DATALAD RUNCMD] run codespell throughout fixing typo automagically 2023-11-18 10:04:04 -05:00
iptables-ipset-proto6-allports.conf Merge branch '0.10' into 0.11 2020-08-04 15:40:59 +02:00
iptables-ipset-proto6.conf Merge branch '0.10' into 0.11 2020-08-04 15:40:59 +02:00
iptables-ipset.conf action.d/*-ipset.conf: workaround sporadic failures by stop if destroying ipset too fast (sleep a bit in error case and repeat); 2024-11-07 19:28:53 +01:00
iptables-multiport-log.conf first attempt to make certain standard actions breakdown safe starting with iptables: 2020-02-14 12:16:25 +01:00
iptables-multiport.conf first attempt to make certain standard actions breakdown safe starting with iptables: 2020-02-14 12:16:25 +01:00
iptables-new.conf first attempt to make certain standard actions breakdown safe starting with iptables: 2020-02-14 12:16:25 +01:00
iptables-xt_recent-echo.conf iptables.conf rewritten to affect all derivative actions (multiple chains are also supported by iptables-ipset etc); 2025-04-16 16:56:46 +02:00
iptables.conf typo 2025-04-16 17:18:36 +02:00
ipthreat.conf Fix more typos 2023-11-22 16:32:05 +00:00
mail-buffered.conf fixed possible RCE vulnerability, unset escape variable (default tilde) stops consider "~" char after new-line as composing escape sequence 2021-06-21 17:12:53 +02:00
mail-whois-common.conf
mail-whois-lines.conf fixed possible RCE vulnerability, unset escape variable (default tilde) stops consider "~" char after new-line as composing escape sequence 2021-06-21 17:12:53 +02:00
mail-whois.conf fixed possible RCE vulnerability, unset escape variable (default tilde) stops consider "~" char after new-line as composing escape sequence 2021-06-21 17:12:53 +02:00
mail.conf fixed possible RCE vulnerability, unset escape variable (default tilde) stops consider "~" char after new-line as composing escape sequence 2021-06-21 17:12:53 +02:00
mikrotik.conf changed missed names 2023-03-08 12:16:35 +00:00
mynetwatchman.conf
netscaler.conf [DATALAD RUNCMD] run codespell throughout fixing typo automagically 2023-11-18 10:04:04 -05:00
nftables-allports.conf
nftables-multiport.conf
nftables.conf action.d/nftables.conf - fixed for SELinux without execmem permission, rewrite capturing with grep -P using grep -E or sed; 2026-01-23 21:23:58 +01:00
nginx-block-map.conf action.d/nginx-block-map.conf: reload nginx only if it is running (also avoid error in nginx-errorlog, gh-2949) and better test coverage for the action 2021-02-24 18:21:42 +01:00
npf.conf
nsupdate.conf
osx-afctl.conf
osx-ipfw.conf
pf.conf added pf[protocol=all] options as recommended by sebres 2023-12-10 11:20:39 +01:00
route.conf
sendmail-buffered.conf
sendmail-common.conf
sendmail-geoip-lines.conf
sendmail-whois-ipjailmatches.conf
sendmail-whois-ipmatches.conf
sendmail-whois-lines.conf
sendmail-whois-matches.conf
sendmail-whois.conf
sendmail.conf
shorewall-ipset-proto6.conf extend ipset actions with new parameter ipsettype for the type of set (gh-3760), affected actions: 2024-06-09 23:38:58 +02:00
shorewall.conf
smtp.py construct smtp.py email wrap long lines 2025-05-20 14:55:03 -04:00
symbiosis-blacklist-allports.conf first attempt to make certain standard actions breakdown safe starting with iptables: 2020-02-14 12:16:25 +01:00
ufw.conf action.d/ufw.conf: update comment: 2025-03-01 00:23:55 +01:00
xarf-login-attack.conf lets see an error (with debug messages) in debug case 2025-09-10 20:04:10 +02:00