Page tree
Skip to end of metadata
Go to start of metadata

Z-Push has a configuration option called LOGAUTHFAIL, by default set to false (disabled).

To enable it, set this configuration parameter to true

This will cause an additional log entry in WARN level that will be logged to z-push-error.log.

 

The log message looks like this:

IP: 123.123.123.123 failed to authenticate user 'user@domain.com'

 

For a systemd server, use:

# FILE : /etc/fail2ban/filter.d/z-push.conf
# Fail2Ban configuration file
[INCLUDES]
before = common.conf
[Definition]
# Option:  failregex
# Notes.:  regex to match the password failures messages in the logfile. The
#          host must be matched by a group named "host". The tag "<HOST>" can
#          be used for standard IP/hostname matching and is only an alias for
#          (?:::f{4,6}:)?(?P<host>[\w\-.^_]+)
# Values:  TEXT
#
failregex = IP: <HOST> failed to authenticate user
ignoreregex =
[Init]
journalmatch = _SYSTEMD_UNIT=fail2ban.service

 

No systemd server, remove these two lines: 

[Init]
journalmatch = _SYSTEMD_UNIT=fail2ban.service

 

If using ufw as firewall:

# UFW file /etc/fail2ban/action.d/ufw-all.conf
# Fail2Ban configuration file ufw-all.conf 
#
# We add the rules to ufw for better control and management
#

[Definition]
actionstart =
actionstop =
actioncheck =
actionban = ufw insert 1 deny from <ip> to any
actionunban = ufw delete deny from <ip> to any

 

This is the actual configuration for fail2ban:

# Jail.local
[z-push]
enabled  = true
port     = http,https
filter   = z-push
banaction = ufw-all
# also enable define('LOGAUTHFAIL', true); in z-push/config.php or /etc/z-push/z-push.conf.php
logpath  = /var/log/z-push/z-push-error.log
maxretry = 3
bantime  = 84600

 

The above configurations were contributed on 23.03.2016 by thctlo in the forum. Thanks!

  • No labels