CasperSecurity

Current Path : /lib/python3/dist-packages/fail2ban/__pycache__/
Upload File :
Current File : //lib/python3/dist-packages/fail2ban/__pycache__/protocol.cpython-310.pyc

o

��_L-�@s�dZdZdZddlZdd�ZGdd�de�Zed	d
dd��Zggd
��ddg�ddg�ddg�ddg�ddg�ddg�ddg�ddg�ddg�d d!g�d"d#g�d$d%g�d&d'g�d(d)g�d*d+g�gd,��d-d.g�d/d0g�d1d2g�d3d4g�d5d6g�d7d8g�d9d:g�gd;��d<d=g�d>d?g�d@dAg�dBdCg�dDdEg�dFdGg�gdH��dIdJg�dKdLg�dMdNg�dOdPg�gdQ��dRdSg�dTdUg�dVdWg�dXdYg�dZd[g�d\d]g�d^d_g�d`dag�dbdcg�dddeg�dfdgg�dhdig�djdkg�dldmg�dndog�dpdqg�drdsg�dtdug�dvdwg�dxdyg�dzd{g�d|d}g�d~dg�d�d�g�d�d�g�d�d�g�d�d�g�gd���d�d�g�d�d�g�d�d�g�d�d�g�d�d�g�d�d�g�gd���d�d�g�d�d�g�gd���d�d�g�d�d�g�d�d�g�d�d�g�d�d�g�d�d�g�d�d�g�d�d�g�d�d�g�d�d�g�d�d�g�d�d�g�d�d�g�d�d�g�d�d�g�d�d�g�d�d�g�d�d�g�d�d�g�gd���d�d�g�d�d�g�d�d�g�d�d�g�d�d�g�d�d�g�gd΢�d�d�g�d�d�g�d�d�g�Zd�dքZ	d�d؄Z
d�dڄZdS)�z
Cyril Jaquierz Copyright (c) 2004 Cyril Jaquier�GPL�NcCst|�dS)zZDefault output handler for printing protocol. 
  Used to ease mocking in the test cases.
	N)�print)�s�r�3/usr/lib/python3/dist-packages/fail2ban/protocol.py�outputsrc@seZdZdd�ZdS)�dotdictcCs||S)Nr)�self�namerrr�__getattr__'szdotdict.__getattr__N)�__name__�
__module__�__qualname__rrrrrr&sr�s<F2B_END_COMMAND>s<F2B_CLOSE_COMMAND>)�EMPTY�END�CLOSE)��BASICr�startzstarts the server and the jails�restartzrestarts the serverz&restart [--unban] [--if-exists] <JAIL>zBrestarts the jail <JAIL> (alias for 'reload --restart ... <JAIL>')z$reload [--restart] [--unban] [--all]z�reloads the configuration without restarting of the server, the option '--restart' activates completely restarting of affected jails, thereby can unban IP addresses (if option '--unban' specified)z1reload [--restart] [--unban] [--if-exists] <JAIL>zIreloads the jail <JAIL>, or restarts it (if option '--restart' specified)�stopz(stops all jails and terminate the serverzunban --allz3unbans all IP addresses (in all jails and database)zunban <IP> ... <IP>z'unbans <IP> (in all jails and database)�bannedz*return jails with banned IPs as dictionaryzbanned <IP> ... <IP>]z4return list(s) of jails where given IP(s) are banned�statusz%gets the current status of the server�pingztests if the server is alive�echoz;for internal usage, returns back and outputs a given string�helpzreturn this output�versionzreturn the server version)r�LOGGINGrzset loglevel <LEVEL>z�sets logging level to <LEVEL>. Levels: CRITICAL, ERROR, WARNING, NOTICE, INFO, DEBUG, TRACEDEBUG, HEAVYDEBUG or corresponding numeric value (50-5)zget loglevelzgets the logging levelzset logtarget <TARGET>zHsets logging target to <TARGET>. Can be STDOUT, STDERR, SYSLOG or a filez
get logtargetzgets logging targetzset syslogsocket auto|<SOCKET>zQsets the syslog socket path to auto or <SOCKET>. Only used if logtarget is SYSLOGzget syslogsocketzgets syslog socket path�	flushlogszAflushes the logtarget if a file and reopens it. For log rotation.)r�DATABASErzset dbfile <FILE>zKset the location of fail2ban persistent datastore. Set to "None" to disablez
get dbfilez1get the location of fail2ban persistent datastorezset dbmaxmatches <INT>z<sets the max number of matches stored in database per ticketzget dbmaxmatchesz<gets the max number of matches stored in database per ticketzset dbpurgeage <SECONDS>z?sets the max age in <SECONDS> that history of bans will be keptzget dbpurgeagez=gets the max age in seconds that history of bans will be kept)rzJAIL CONTROLrzadd <JAIL> <BACKEND>zcreates <JAIL> using <BACKEND>zstart <JAIL>zstarts the jail <JAIL>zstop <JAIL>z*stops the jail <JAIL>. The jail is removedzstatus <JAIL> [FLAVOR]zHgets the current status of <JAIL>, with optional flavor or extended info)rzJAIL CONFIGURATIONrzset <JAIL> idle on|offzsets the idle state of <JAIL>z set <JAIL> ignoreself true|falsez'allows the ignoring of own IP addresseszset <JAIL> addignoreip <IP>z&adds <IP> to the ignore list of <JAIL>zset <JAIL> delignoreip <IP>z+removes <IP> from the ignore list of <JAIL>z set <JAIL> ignorecommand <VALUE>zsets ignorecommand of <JAIL>zset <JAIL> ignorecache <VALUE>zsets ignorecache of <JAIL>z%set <JAIL> addlogpath <FILE> ['tail']zmadds <FILE> to the monitoring list of <JAIL>, optionally starting at the 'tail' of the file (default 'head').zset <JAIL> dellogpath <FILE>z1removes <FILE> from the monitoring list of <JAIL>z!set <JAIL> logencoding <ENCODING>z/sets the <ENCODING> of the log files for <JAIL>z"set <JAIL> addjournalmatch <MATCH>z,adds <MATCH> to the journal filter of <JAIL>z"set <JAIL> deljournalmatch <MATCH>z1removes <MATCH> from the journal filter of <JAIL>zset <JAIL> addfailregex <REGEX>zHadds the regular expression <REGEX> which must match failures for <JAIL>zset <JAIL> delfailregex <INDEX>z7removes the regular expression at <INDEX> for failregexz!set <JAIL> addignoreregex <REGEX>zTadds the regular expression <REGEX> which should match pattern to exclude for <JAIL>z!set <JAIL> delignoreregex <INDEX>z9removes the regular expression at <INDEX> for ignoreregexzset <JAIL> findtime <TIME>zPsets the number of seconds <TIME> for which the filter will look back for <JAIL>zset <JAIL> bantime <TIME>zBsets the number of seconds <TIME> a host will be banned for <JAIL>z set <JAIL> datepattern <PATTERN>z6sets the <PATTERN> used to match date/times for <JAIL>zset <JAIL> usedns <VALUE>zsets the usedns mode for <JAIL>z3set <JAIL> attempt <IP> [<failure1> ... <failureN>]z"manually notify about <IP> failurezset <JAIL> banip <IP> ... <IP>zmanually Ban <IP> for <JAIL>z2set <JAIL> unbanip [--report-absent] <IP> ... <IP>zmanually Unban <IP> in <JAIL>zset <JAIL> maxretry <RETRY>zFsets the number of failures <RETRY> before banning the host for <JAIL>zset <JAIL> maxmatches <INT>zDsets the max number of matches stored in memory per ticket in <JAIL>zset <JAIL> maxlines <LINES>z@sets the number of <LINES> to buffer for regex search for <JAIL>z6set <JAIL> addaction <ACT>[ <PYTHONFILE> <JSONKWARGS>]z�adds a new action named <ACT> for <JAIL>. Optionally for a Python based action, a <PYTHONFILE> and <JSONKWARGS> can be specified, else will be a Command Actionzset <JAIL> delaction <ACT>z$removes the action <ACT> from <JAIL>)rzCOMMAND ACTION CONFIGURATIONrz)set <JAIL> action <ACT> actionstart <CMD>z;sets the start command <CMD> of the action <ACT> for <JAIL>z(set <JAIL> action <ACT> actionstop <CMD>z:sets the stop command <CMD> of the action <ACT> for <JAIL>z)set <JAIL> action <ACT> actioncheck <CMD>z;sets the check command <CMD> of the action <ACT> for <JAIL>z'set <JAIL> action <ACT> actionban <CMD>z9sets the ban command <CMD> of the action <ACT> for <JAIL>z)set <JAIL> action <ACT> actionunban <CMD>z;sets the unban command <CMD> of the action <ACT> for <JAIL>z)set <JAIL> action <ACT> timeout <TIMEOUT>zPsets <TIMEOUT> as the command timeout in seconds for the action <ACT> for <JAIL>)rzGENERAL ACTION CONFIGURATIONrz*set <JAIL> action <ACT> <PROPERTY> <VALUE>z>sets the <VALUE> of <PROPERTY> for the action <ACT> for <JAIL>z/set <JAIL> action <ACT> <METHOD>[ <JSONKWARGS>]zDcalls the <METHOD> with <JSONKWARGS> for the action <ACT> for <JAIL>)rzJAIL INFORMATIONrzget <JAIL> bannedzreturn banned IPs of <JAIL>z get <JAIL> banned <IP> ... <IP>]zQreturn 1 if IP is banned in <JAIL> otherwise 0, or a list of 1/0 for multiple IPszget <JAIL> logpathz/gets the list of the monitored files for <JAIL>zget <JAIL> logencodingz-gets the encoding of the log files for <JAIL>zget <JAIL> journalmatchz(gets the journal filter match for <JAIL>zget <JAIL> ignoreselfz;gets the current value of the ignoring the own IP addresseszget <JAIL> ignoreipz0gets the list of ignored IP addresses for <JAIL>zget <JAIL> ignorecommandzgets ignorecommand of <JAIL>zget <JAIL> failregexzJgets the list of regular expressions which matches the failures for <JAIL>zget <JAIL> ignoreregexzPgets the list of regular expressions which matches patterns to ignore for <JAIL>zget <JAIL> findtimezIgets the time for which the filter will look back for failures for <JAIL>zget <JAIL> bantimez)gets the time a host is banned for <JAIL>zget <JAIL> datepatternz3gets the patern used to match date/times for <JAIL>zget <JAIL> usednsz"gets the usedns setting for <JAIL>z$get <JAIL> banip [<SEP>|--with-time]z�gets the list of of banned IP addresses for <JAIL>. Optionally the separator character ('<SEP>', default is space) or the option '--with-time' (printing the times of ban) may be specified. The IPs are ordered by end of ban.zget <JAIL> maxretryz.gets the number of failures allowed for <JAIL>zget <JAIL> maxmatcheszDgets the max number of matches stored in memory per ticket in <JAIL>zget <JAIL> maxlinesz-gets the number of lines to buffer for <JAIL>zget <JAIL> actionsz!gets a list of actions for <JAIL>)rzCOMMAND ACTION INFORMATIONrz#get <JAIL> action <ACT> actionstartz6gets the start command for the action <ACT> for <JAIL>z"get <JAIL> action <ACT> actionstopz5gets the stop command for the action <ACT> for <JAIL>z#get <JAIL> action <ACT> actioncheckz6gets the check command for the action <ACT> for <JAIL>z!get <JAIL> action <ACT> actionbanz4gets the ban command for the action <ACT> for <JAIL>z#get <JAIL> action <ACT> actionunbanz6gets the unban command for the action <ACT> for <JAIL>zget <JAIL> action <ACT> timeoutzCgets the command timeout in seconds for the action <ACT> for <JAIL>)rzGENERAL ACTION INFORMATIONrz!get <JAIL> actionproperties <ACT>z9gets a list of properties for the action <ACT> for <JAIL>zget <JAIL> actionmethods <ACT>z6gets a list of methods for the action <ACT> for <JAIL>z"get <JAIL> action <ACT> <PROPERTY>z<gets the value of <PROPERTY> for the action <ACT> for <JAIL>cCs�d}d}d}d}tD]Z}|ddkr|rtd�d}d}t|d�|kr.d||d	|d	<tj|d	|dd
�D]+}|rUd||dd|t|d�|��}d}n
d|||��}t|�q8q
dS)N��)�"FrrT� �)�drop_whitespace)�protocolr�len�textwrap�wrap�strip)�INDENT�MARGIN�WIDTH�firstHeading�m�first�n�linerrr�printFormatted�s&,
��r4cCsnd}tD],}|ddkr|rtd�t|d|d�d}qtd�td	|dd
|d�qtd�dS)NFrrz|}r%�Tz|-z(| <span style="white-space:nowrap;"><tt>z</tt></span> || || )r'r�__printWikiHeader)r/r0rrr�	printWiki�sr7cCsDtd�td|d�td�t|�td�td�td�dS)Nrz=== z ===z{|z'| '''Command''' || || '''Description''')r)�section�descrrrr6�sr6)�
__author__�
__copyright__�__license__r)r�dictr�CSPROTOr'r4r7r6rrrr�<module>s�	���������	�
���
������������������ �!�"�#�$�%�&�'�(�)�*�+�,�-�.�/�0�1�2�3�4�5�6�7�8�9�:�;�<�=�>�?�@�A�B�C�D�E�F�G�H�I�J�K�L�M�N�O�P�Q�R�S�T�U�V�W�X�Y�Z�[�\�]�^�_�`�a�b�c�d�e�f�g�h�i�j�r
Hacker Blog, Shell İndir, Sql İnjection, XSS Attacks, LFI Attacks, Social Hacking, Exploit Bot, Proxy Tools, Web Shell, PHP Shell, Alfa Shell İndir, Hacking Training Set, DDoS Script, Denial Of Service, Botnet, RFI Attacks, Encryption
Telegram @BIBIL_0DAY