Package: fail2ban
Version: 0.8.6-3
Followup-For: Bug #620760

-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160

Dear Maintainer,
The issue (looking in /var/log/dropbear instead of /var/log/auth.log) still 
exists in this version of fail2ban.  In addition, the
issues with the regexps are misleading.

The comments in /etc/fail2ban/filter.d/dropbear.conf say:

# The standard Dropbear output doesn't provide enough information to
# ban all types of attack.  The Dropbear patch adds IP address
# information to the 'exit before auth' message which is always
# produced for any form of non-successful login

However, that doesn't take into account the fact that dropbear forks per
connection.  If you look at the following excerpts from my
/var/log/auth.log you can see the ip is listed on one line, and the
'exit before auth' line is on a different line, but with the same PID.


Jun 14 17:29:35 bminton dropbear[12820]: Child connection from 
78.129.132.12:46967
Jun 14 17:29:37 bminton dropbear[12820]: Login attempt for nonexistent user 
from 78.129.132.12:46967
Jun 14 17:29:37 bminton dropbear[12820]: Exit before auth: Disconnect received
Jun 14 17:29:37 bminton dropbear[12821]: Child connection from 
78.129.132.12:47087
Jun 14 17:29:39 bminton dropbear[12821]: Login attempt for nonexistent user 
from 78.129.132.12:47087
Jun 14 17:29:39 bminton dropbear[12821]: Exit before auth: Disconnect received
Jun 14 17:29:40 bminton dropbear[12822]: Child connection from 
78.129.132.12:47182
Jun 14 17:29:41 bminton dropbear[12822]: Login attempt for nonexistent user 
from 78.129.132.12:47182
Jun 14 17:29:41 bminton dropbear[12822]: Exit before auth: Disconnect received


- -- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable')
Architecture: i386 (x86_64)

Kernel: Linux 3.0.24-std251-amd64 (SMP w/2 CPU cores)
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/bash

Versions of packages fail2ban depends on:
ii  lsb-base        4.1+Debian7
ii  python          2.7.3~rc2-1
ii  python-central  0.6.17

Versions of packages fail2ban recommends:
ii  iptables      1.4.13-1.1
ii  python-gamin  0.1.10-4
ii  whois         5.0.16

Versions of packages fail2ban suggests:
ii  bsd-mailx [mailx]  8.1.2-0.20111106cvs-1

- -- Configuration Files:
/etc/fail2ban/jail.conf changed:
[DEFAULT]
ignoreip = 127.0.0.1/8
bantime  = 600
maxretry = 3
backend = auto
destemail = root@localhost
banaction = iptables-multiport
mta = sendmail
protocol = tcp
chain = INPUT
action_ = %(banaction)s[name=%(__name__)s, port="%(port)s", 
protocol="%(protocol)s", chain="%(chain)s"]
action_mw = %(banaction)s[name=%(__name__)s, port="%(port)s", 
protocol="%(protocol)s", chain="%(chain)s"]
              %(mta)s-whois[name=%(__name__)s, dest="%(destemail)s", 
protocol="%(protocol)s", chain="%(chain)s"]
action_mwl = %(banaction)s[name=%(__name__)s, port="%(port)s", 
protocol="%(protocol)s", chain="%(chain)s"]
               %(mta)s-whois-lines[name=%(__name__)s, dest="%(destemail)s", 
logpath=%(logpath)s, chain="%(chain)s"]
action = %(action_)s
[ssh]
enabled  = true
port     = ssh
filter   = sshd
logpath  = /var/log/auth.log
maxretry = 6
[dropbear]
enabled  = true
port     = ssh
filter   = sshd
logpath  = /var/log/auth.log
maxretry = 6
[pam-generic]
enabled  = false
filter   = pam-generic
port     = all
banaction = iptables-allports
port     = anyport
logpath  = /var/log/auth.log
maxretry = 6
[xinetd-fail]
enabled   = false
filter    = xinetd-fail
port      = all
banaction = iptables-multiport-log
logpath   = /var/log/daemon.log
maxretry  = 2
[ssh-ddos]
enabled  = false
port     = ssh
filter   = sshd-ddos
logpath  = /var/log/auth.log
maxretry = 6
[apache]
enabled  = false
port     = http,https
filter   = apache-auth
logpath  = /var/log/apache*/*error.log
maxretry = 6
[apache-multiport]
enabled   = false
port      = http,https
filter    = apache-auth
logpath   = /var/log/apache*/*error.log
maxretry  = 6
[apache-noscript]
enabled  = false
port     = http,https
filter   = apache-noscript
logpath  = /var/log/apache*/*error.log
maxretry = 6
[apache-overflows]
enabled  = false
port     = http,https
filter   = apache-overflows
logpath  = /var/log/apache*/*error.log
maxretry = 2
[vsftpd]
enabled  = false
port     = ftp,ftp-data,ftps,ftps-data
filter   = vsftpd
logpath  = /var/log/vsftpd.log
maxretry = 6
[proftpd]
enabled  = false
port     = ftp,ftp-data,ftps,ftps-data
filter   = proftpd
logpath  = /var/log/proftpd/proftpd.log
maxretry = 6
[pure-ftpd]
enabled  = false
port     = ftp,ftp-data,ftps,ftps-data
filter   = pure-ftpd
logpath  = /var/log/auth.log
maxretry = 6
[wuftpd]
enabled  = false
port     = ftp,ftp-data,ftps,ftps-data
filter   = wuftpd
logpath  = /var/log/auth.log
maxretry = 6
[postfix]
enabled  = false
port     = smtp,ssmtp
filter   = postfix
logpath  = /var/log/mail.log
[couriersmtp]
enabled  = false
port     = smtp,ssmtp
filter   = couriersmtp
logpath  = /var/log/mail.log
[courierauth]
enabled  = false
port     = smtp,ssmtp,imap2,imap3,imaps,pop3,pop3s
filter   = courierlogin
logpath  = /var/log/mail.log
[sasl]
enabled  = false
port     = smtp,ssmtp,imap2,imap3,imaps,pop3,pop3s
filter   = sasl
logpath  = /var/log/mail.log
[dovecot]
enabled = false
port    = smtp,ssmtp,imap2,imap3,imaps,pop3,pop3s
filter  = dovecot
logpath = /var/log/mail.log
[named-refused-tcp]
enabled  = false
port     = domain,953
protocol = tcp
filter   = named-refused
logpath  = /var/log/named/security.log


- -- no debconf information

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEAREDAAYFAk/bN0AACgkQ2/alund99IdPfgCghBr1JnkTSwCyTF+p+SH9b4r8
510AoLkWKJx5Ixv+TzxzJFGLBI9vaxee
=meEx
-----END PGP SIGNATURE-----



-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to