Changed Fail2ban settings, updated Readme (#191)

* Made fail2ban settings more consistent across OSes, disabled HTTP ratelimit permaban on Debian as auto-refresh behaviour in FusionPBX can trigger it.

* Increase nginx-404 ban back to 1 hour
This commit is contained in:
danry25
2018-10-11 11:22:35 -07:00
committed by FusionPBX
parent 0ac1c952ae
commit 009702bd12
5 changed files with 18 additions and 15 deletions

View File

@@ -86,7 +86,7 @@ bantime = 3600
# Based on apache-badbots but a simple IP check (any IP requesting more than
# 240 pages in 60 seconds, or 4p/s average, is suspicious)
# Block for two full days.
enabled = true
enabled = false
port = 80,443
protocol = tcp
filter = nginx-dos
@@ -94,4 +94,4 @@ logpath = /var/log/nginx/access*.log
findtime = 60
maxretry = 240
banaction = pf
bantime = 172800
bantime = 86400