Skip to content

Commit 938c6ef

Browse files
committed
Update fail2ban configuration
Fixes #1177.
1 parent 0add01d commit 938c6ef

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

doc/examples/fail2ban.conf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22

33
[Definition]
44

5-
failregex = ^INFO\s+Failed login attempt\s+{\"password\":\"(\\.|[^"])*\",\"remoteAddress\":\"<HOST>\"
5+
failregex = ^Failed login attempt\s+{\"remoteAddress\":\"<HOST>\"
66

77
# Use this instead for proxies (ensure the proxy is configured to send the
88
# X-Forwarded-For header).
9-
# failregex = ^INFO\s+Failed login attempt\s+{\"password\":\"(\\.|[^"])*\",\"xForwardedFor\":\"<HOST>\"
9+
# failregex = ^Failed login attempt\s+{\"xForwardedFor\":\"<HOST>\"
1010

1111
ignoreregex =
1212

doc/fail2ban.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,6 @@ accessible from the internet (use localhost or block it in your firewall).
3030
## Fail2Ban
3131
Fail2Ban allows for automatically banning and logging repeated failed
3232
authentication attempts for many applications through regex filters. A working
33-
filter for code-server can be found in `./code-server.fail2ban.conf`. Once this
33+
filter for code-server can be found in `./examples/fail2ban.conf`. Once this
3434
is installed and configured correctly, repeated failed login attempts should
3535
automatically be banned from connecting to your server.

0 commit comments

Comments
 (0)