> do you mean /etc/fail2ban/filter.d/sshd-root.conf ?

Yes, of course. 
Sorry about the mistake.

> also would you be so kind to test with the 
latest release? backport
> is avail from http://neuro.debian.net/repository

This is a 
production server and I can't afford any downtime. Therefore I am very 
reluctant to install anything except security updates, even though in 
this case the risk is almost non existant.

I think for the moment I'll 
disable my custom jail. Since ssh root access is disabled, my intention 
was to ban anyone who tries immediately, but I think I can live with 
giving them a few more tries. 

Nevertheless, even if it doesn't get 
fixed it would be desirable to at least have a warning in the 
documentation, as this bug quietly makes jails ineffective and leaves 
the server open to bruteforce attacks. Furthermore, it only occurs upon 
the second log rotation which makes it even harder to detect. 

I 
realized only after I looked at the logs and detected a particular IP 
who kept trying random accounts once a minute for about 7 hours. 
Following that, it took me another few days to understand what was 
happening...


-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to