Your message dated Tue, 20 May 2014 09:34:37 +0000
with message-id <[email protected]>
and subject line Bug#437824: fixed in libapache-mod-evasive 1.10.1-3
has caused the Debian Bug report #437824,
regarding libapache2-mod-evasive: sending out an email on dos attack does not 
seem to work
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
437824: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437824
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: libapache2-mod-evasive
Version: 1.10.1-1~bpo1
Severity: normal

I tried using DOSEmailNotify as follows:

ms@mondschein:~> cat /etc/apache2/mods-enabled/evasive.conf
#<IfModule mod_evasive20.c>
    #DOSHashTableSize    3097
    #DOSPageCount        2
    #DOSSiteCount        50
    #DOSPageInterval     1
    #DOSSiteInterval     1
    #DOSBlockingPeriod   10

    DOSEmailNotify       root@mondschein
    #DOSSystemCommand    "su - someuser -c '/sbin/... %s ...'"
    #DOSLogDir           "/var/log/mod_evasive"
#</IfModule>

The dos prevention works as the example perl script shows. I also get an
entry in syslog telling about the possible dos attack. But it does not
even try to send an email. 

I do not understand why. There is no trace of an email being send in
Postfix's mail.log. The mail in the source seems to be set correctly as
well:

#define MAILER  "/bin/mail %s"

At least I have this command here and when using it from the command
line it works as it should.

Any idea?

I am using a etch backport I created[1], but I also tested it on my 
notebook with the lenny version.

[1] http://people.teamix.org/~ms/backports/etch-backports/libapache-mod-evasive/

-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable'), (1, 'testing')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.22.2-workstation-cfs-v19.1-sws2-2.2.10
Locale: LANG=de_DE@euro, LC_CTYPE=de_DE@euro (charmap=ISO-8859-15)

Versions of packages libapache2-mod-evasive depends on:
ii  apache2.2-common            2.2.3-4      Next generation, scalable, extenda
ii  libc6                       2.3.6.ds1-13 GNU C Library: Shared libraries

libapache2-mod-evasive recommends no packages.

-- no debconf information


--- End Message ---
--- Begin Message ---
Source: libapache-mod-evasive
Source-Version: 1.10.1-3

We believe that the bug you reported is fixed in the latest version of
libapache-mod-evasive, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Alberto Gonzalez Iniesta <[email protected]> (supplier of updated 
libapache-mod-evasive package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 20 May 2014 10:23:07 +0200
Source: libapache-mod-evasive
Binary: libapache2-mod-evasive
Architecture: source amd64
Version: 1.10.1-3
Distribution: unstable
Urgency: medium
Maintainer: Alberto Gonzalez Iniesta <[email protected]>
Changed-By: Alberto Gonzalez Iniesta <[email protected]>
Description: 
 libapache2-mod-evasive - evasive module to minimize HTTP DoS or brute force 
attacks
Closes: 437824
Changes: 
 libapache-mod-evasive (1.10.1-3) unstable; urgency=medium
 .
   * Fix wrong path for mail binary. Depend on mailx.
     (Closes: #437824)
   * Bumped Standards-Version to 3.9.5. No change.
Checksums-Sha1: 
 c17eeb35663993309174c95c07ea2f8f5c9f863a 1864 
libapache-mod-evasive_1.10.1-3.dsc
 4ae83a3f7998c9856aa46aec20c246967867e557 4424 
libapache-mod-evasive_1.10.1-3.debian.tar.xz
 95c2445dbd7fc4117c34279d50188ef339f56326 14954 
libapache2-mod-evasive_1.10.1-3_amd64.deb
Checksums-Sha256: 
 0f426b7a2cd21f72889621f0b12b7d246bc40cad59d870c8ad76602c6c04537f 1864 
libapache-mod-evasive_1.10.1-3.dsc
 b4e94e3e8e6e0f82485a8f177d09d8d8171728c6ded9c7b2c917de23454101b7 4424 
libapache-mod-evasive_1.10.1-3.debian.tar.xz
 dc258ded17affe1dd325d267846df25f726d54ae98be6b0c63c7f79bb0116abc 14954 
libapache2-mod-evasive_1.10.1-3_amd64.deb
Files: 
 c3a2b4e0ef2a2b47134f7262ebffe455 14954 web optional 
libapache2-mod-evasive_1.10.1-3_amd64.deb
 5be59d127d48c8849545b2535a1312f5 1864 web optional 
libapache-mod-evasive_1.10.1-3.dsc
 4ed241e33a4bf482eec526ef2c9eb65d 4424 web optional 
libapache-mod-evasive_1.10.1-3.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=2Sz8
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to