ini 使用file2ban(apache2 / httpd)防止Wordpress pingback攻击

Posted

tags:

篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了ini 使用file2ban(apache2 / httpd)防止Wordpress pingback攻击相关的知识,希望对你有一定的参考价值。

[INCLUDES]

# Read common prefixes. If any customizations available -- read them from
# common.local
before = apache-common.conf

[Definition]
# Option:  failregex
# Notes.:  regex to match the w00tw00t scan messages in the logfile. The
#          host must be matched by a group named "host". The tag "" can
#          be used for standard IP/hostname matching.
# Values:  TEXT
#failregex = ^ -.*WordPress.*

failregex = ^<HOST> .*GET|POST .*WordPress.*

# Option:  ignoreregex
# Notes.:  regex to ignore. If this regex matches, the line is ignored.
# Values:  TEXT
ignoreregex =

以上是关于ini 使用file2ban(apache2 / httpd)防止Wordpress pingback攻击的主要内容,如果未能解决你的问题,请参考以下文章