https://bugs.contribs.org/show_bug.cgi?id=10422

            Bug ID: 10422
           Summary: NFR: portscan jail
    Classification: Contribs
           Product: SME Contribs
           Version: 9.2
          Hardware: ---
                OS: ---
            Status: UNCONFIRMED
          Severity: normal
          Priority: P3
         Component: smeserver-fail2ban
          Assignee: [email protected]
          Reporter: [email protected]
        QA Contact: [email protected]
  Target Milestone: ---

Created attachment 5987
  --> https://bugs.contribs.org/attachment.cgi?id=5987&action=edit
91Portscan

I'd like to have a portscan jail for fail2ban.

I've implemented this on my own server and it seems to be working -- but the
way I've done so means that almost every banned host is detected as a portscan
as soon as fail2ban blocks it.

That is, portscan looks for 'denylog' entries in /var/log/iptables/current -
which *does* find actual port scans, but which at present also finds any access
attempts from hosts that have been banned by fail2ban.

I feel like a complete solution would require creating a separate
'fail2ban-denied' chain in iptables, then updating
/etc/e-smith/templates/etc/rc.d/init.d/masq/90AdjustFail2Ban to use that
instead of 'denylog' so that access attempts blocked by fail2ban itself do not
generate false positives in 'portscan'.

Anyway, the files attached enable a portscan jail in fail2ban

- download 91Portscan to /etc/e-smith/templates-custom/etc/fail2ban/jail.conf/
- download portscan.conf to /etc/fail2ban/filter.d
- signal-event fail2ban-conf

-- 
You are receiving this mail because:
You are the QA Contact for the bug.
_______________________________________________
Mail for each SME Contribs bug report
To unsubscribe, e-mail [email protected]
Searchable archive at https://lists.contribs.org/mailman/public/contribteam/

Reply via email to