(Ubuntu 20.04 - /etc/fail2ban/filter.d/minetest.conf)
minetest.conf
Code: Select all
# Fail2Ban configuration file
#
# Author: Andrey Petrov
#
# 0.0.1
#
[Definition]
# Option: failregex
# Notes.: regex to match the password failures messages in the logfile. The
# host must be matched by a group named "host". The tag "<HOST>" can
# be used for standard IP/hostname matching and is only an alias for
# (?:::f{4,6}:)?(?P<host>[\w\-.^_]+)
# Values: TEXT
#
failregex = ^: ACTION\[Server\]: Server: User \w+ at <HOST> supplied wrong password \(auth mechanism: SRP\)\.$
^: ACTION\[Server\]: Server: Player with the name "\w+" tried to connect from <HOST> but it was disallowed for the following reason: $
(Ubuntu 20.04 - /etc/fail2ban/jail.local)
jail.local
Code: Select all
[minetest]
enabled = true
port = 30000
protocol = udp
filter = minetest
logpath = /home/minetestuser/.minetest/debug.txt
findtime = 6000
bantime = 30000
maxretry = 12