Your message dated Fri, 23 Nov 2007 18:02:02 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#451093: fixed in fail2ban 0.8.1-3
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: fail2ban
Version: 0.8.1-2
Severity: wishlist

The filters:

/etc/fail2ban/filter.d/sshd.conf
/etc/fail2ban/filter.d/sshd-ddos.conf

don't trigger the IP addresses blocked by the /etc/hosts.deny file.
I think is desirable that fail2ban identify these attempts.

I've added the following line to sshd.conf 

failregex = refused connect from <HOST>\s

that correctly work with:

Nov 13 03:42:11 Server sshd[4240]: refused connect from
::ffff:210.21.243.47 (::ffff:210.21.243.47)

but don't work with the following line, from my auth.log:

Nov 11 23:33:27 Server sshd[5174]: refused connect from
_U2FsdGVkX19P3BCJmFBHhjLza8BcMH06WCUVwttMHpE=_@::ffff:218.249.210.161
(::ffff:218.249.210.161)

the error on fail2ban.log file is:

2007-11-12 14:16:33,923 fail2ban.filter : WARNING Unable to find a
corresponding IP address for
_U2FsdGVkX19P3BCJmFBHhjLza8BcMH06WCUVwttMHpE=_@::ffff:218.249.210.161

I think that "<HOST>" macro on filters is bad. I also tried with
"<host>" but without any success.

My configuration files are:

jail.local:
[ssh]
maxretry = 2
protocol = tcp

sshd.local:
[Definition]
failregex = (?:error: PAM: )?Authentication failure for .* from <HOST>\s*$
            Failed [-/\w]+ for .* from <HOST>(?: port \d*)?(?: ssh\d*)?\s*$
            ROOT LOGIN REFUSED.* FROM <HOST>\s*$
            [iI](?:llegal|nvalid) user .* from <HOST>\s*$
            User .+ from <HOST> not allowed because not listed in AllowUsers\s*$
            User .+ from <HOST> not allowed because none of user's groups are 
listed in AllowGroups\s*$
            refused connect from <HOST>\s
ignoreregex = 

Thank you for your attention and thank you for package maintaining.

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (560, 'testing'), (545, 'testing-proposed-updates'), (540, 
'testing'), (460, 'stable'), (445, 'proposed-updates'), (440, 'stable'), (50, 
'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.22-2-686 (SMP w/1 CPU core)
Locale: LANG=it_IT, LC_CTYPE=it_IT (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/bash

Versions of packages fail2ban depends on:
ii  iptables                1.3.8.0debian1-1 administration tools for packet fi
ii  lsb-base                3.1-24           Linux Standard Base 3.1 init scrip
ii  python                  2.4.4-6          An interactive high-level object-o
ii  python-central          0.5.15           register and build utility for Pyt

fail2ban recommends no packages.

-- no debconf information



--- End Message ---
--- Begin Message ---
Source: fail2ban
Source-Version: 0.8.1-3

We believe that the bug you reported is fixed in the latest version of
fail2ban, which is due to be installed in the Debian FTP archive:

fail2ban_0.8.1-3.diff.gz
  to pool/main/f/fail2ban/fail2ban_0.8.1-3.diff.gz
fail2ban_0.8.1-3.dsc
  to pool/main/f/fail2ban/fail2ban_0.8.1-3.dsc
fail2ban_0.8.1-3_all.deb
  to pool/main/f/fail2ban/fail2ban_0.8.1-3_all.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Yaroslav Halchenko <[EMAIL PROTECTED]> (supplier of updated fail2ban package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri, 23 Nov 2007 11:42:24 -0500
Source: fail2ban
Binary: fail2ban
Architecture: source all
Version: 0.8.1-3
Distribution: unstable
Urgency: low
Maintainer: Yaroslav Halchenko <[EMAIL PROTECTED]>
Changed-By: Yaroslav Halchenko <[EMAIL PROTECTED]>
Description: 
 fail2ban   - bans IPs that cause multiple authentication errors
Closes: 436053 451093
Changes: 
 fail2ban (0.8.1-3) unstable; urgency=low
 .
   * Added Vcs- fields, moved Homepage into source header's field
   * Propagated patch from 0.9 upstream branch: "Replaced ssocket.py with
     asyncore/asynchat implementation.  Correct fix for bug #1769616. That is
     supposed to resolve spontaneous 100% CPU utilization by fail2ban-server."
   * BF: removed sftp from ssh jails (closes: #436053)
   * NF: new filter for 'refused connect' (closes: #451093). Thanks Guido
     Bozzetto
   * Moved iptables into recommends since fail2ban can work without iptables
     using some other action (e.g hosts.deny)
Files: 
 06f1151c70e8c21742c12af682eadcc3 805 net optional fail2ban_0.8.1-3.dsc
 05383ef4e31c63c76e29d23aced94e65 27120 net optional fail2ban_0.8.1-3.diff.gz
 e308ba7dac8cd59f5fddb2abeb93cda4 78410 net optional fail2ban_0.8.1-3_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHRxRjjRFFY3XAJMgRApaOAJsFRAkwg1cxNPtdEL8yKlqwPC5vlwCeIPeO
WbI3iporwENf4ZNlQ4PUssM=
=d18G
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to