From 452053ce2bc8558aa6b02f5a5f876cc9ad38b992 Mon Sep 17 00:00:00 2001 From: Pavel Date: Sun, 7 Sep 2025 20:09:21 +0200 Subject: [PATCH 1/5] chore(confs): sync action.d with upstream Fail2Ban --- action.d/abuseipdb.conf | 4 +- action.d/apprise.conf | 4 +- action.d/blocklist_de.conf | 5 +- action.d/bsd-ipfw.conf | 2 +- action.d/cloudflare-token.conf | 13 ++-- action.d/complain.conf | 4 +- action.d/firewallcmd-ipset.conf | 43 +++++++++----- action.d/firewallcmd-rich-rules.conf | 4 +- action.d/iptables-ipset-proto4.conf | 14 ++++- action.d/iptables-ipset.conf | 21 +++++-- action.d/iptables-new.conf | 3 +- action.d/iptables-xt_recent-echo.conf | 9 +-- action.d/iptables.conf | 33 ++++++----- action.d/ipthreat.conf | 6 +- action.d/mikrotik.conf | 85 +++++++++++++++++++++++++++ action.d/netscaler.conf | 4 +- action.d/nftables.conf | 13 ++-- action.d/pf.conf | 8 ++- action.d/shorewall-ipset-proto6.conf | 19 +++++- action.d/ufw.conf | 4 +- 20 files changed, 220 insertions(+), 78 deletions(-) create mode 100644 action.d/mikrotik.conf diff --git a/action.d/abuseipdb.conf b/action.d/abuseipdb.conf index 1702884..8315a6c 100644 --- a/action.d/abuseipdb.conf +++ b/action.d/abuseipdb.conf @@ -1,4 +1,4 @@ -## Version 2022/08/06 +## Version 2024/05/20 # Fail2ban configuration file # # Action to report IP address to abuseipdb.com @@ -81,7 +81,7 @@ actioncheck = # use my (Shaun's) helper PHP script by commenting out the first #actionban # line below, uncommenting the second one, and pointing the URL at # wherever you install the helper script. For the PHP helper script, see -# +# # # Tags: See jail.conf(5) man page # Values: CMD diff --git a/action.d/apprise.conf b/action.d/apprise.conf index 3a6bdeb..2f56fc5 100644 --- a/action.d/apprise.conf +++ b/action.d/apprise.conf @@ -1,4 +1,4 @@ -## Version 2022/08/06 +## Version 2024/09/02 # Fail2Ban configuration file # # Author: Chris Caron @@ -11,7 +11,7 @@ # Notes.: command executed once at the start of Fail2Ban. # Values: CMD # -actionstart = printf %%b "The jail as been started successfully." | -t "[Fail2Ban] : started on `uname -n`" +actionstart = printf %%b "The jail has been started successfully." | -t "[Fail2Ban] : started on `uname -n`" # Option: actionstop # Notes.: command executed once at the end of Fail2Ban diff --git a/action.d/blocklist_de.conf b/action.d/blocklist_de.conf index d2b0b68..ac6b4ea 100644 --- a/action.d/blocklist_de.conf +++ b/action.d/blocklist_de.conf @@ -1,4 +1,4 @@ -## Version 2022/08/06 +## Version 2019/06/29 # Fail2Ban configuration file # # Author: Steven Hiscocks @@ -31,6 +31,9 @@ [Definition] +# bypass reporting of restored (already reported) tickets: +norestored = 1 + # Option: actionstart # Notes.: command executed on demand at the first ban (or at the start of Fail2Ban if actionstart_on_demand is set to false). # Values: CMD diff --git a/action.d/bsd-ipfw.conf b/action.d/bsd-ipfw.conf index 9097ed4..e9ff8f2 100644 --- a/action.d/bsd-ipfw.conf +++ b/action.d/bsd-ipfw.conf @@ -81,7 +81,7 @@ block = ip # Option: blocktype # Notes.: How to block the traffic. Use a action from man 5 ipfw # Common values: deny, unreach port, reset -# ACTION defination at the top of man ipfw for allowed values. +# ACTION definition at the top of man ipfw for allowed values. # Values: STRING # blocktype = unreach port diff --git a/action.d/cloudflare-token.conf b/action.d/cloudflare-token.conf index efa59dd..730f5a1 100644 --- a/action.d/cloudflare-token.conf +++ b/action.d/cloudflare-token.conf @@ -1,4 +1,4 @@ -## Version 2022/12/15 +## Version 2025/03/01 # # Author: Logic-32 # @@ -51,11 +51,12 @@ actionban = curl -s -X POST "<_cf_api_url>" \ #