Changed Fail2ban settings, updated Readme (#191)

* Made fail2ban settings more consistent across OSes, disabled HTTP ratelimit permaban on Debian as auto-refresh behaviour in FusionPBX can trigger it.

* Increase nginx-404 ban back to 1 hour
This commit is contained in:
danry25
2018-10-11 11:22:35 -07:00
committed by FusionPBX
parent 0ac1c952ae
commit 009702bd12
5 changed files with 18 additions and 15 deletions

View File

@@ -95,7 +95,7 @@ port = 80,443
protocol = tcp
filter = nginx-404
logpath = /var/log/nginx/access*.log
bantime = 600
bantime = 3600
findtime = 60
maxretry = 120
@@ -103,11 +103,11 @@ maxretry = 120
# Based on apache-badbots but a simple IP check (any IP requesting more than
# 240 pages in 60 seconds, or 4p/s average, is suspicious)
# Block for two full days.
enabled = true
enabled = false
port = 80,443
protocol = tcp
filter = nginx-dos
logpath = /var/log/nginx/access*.log
findtime = 60
bantime = 172800
bantime = 86400
maxretry = 240